Abstract
Identification, authentication, and integrity checking are important tasks for ensuring the security and protection of valuable objects, devices, programs, and data. The utilization of the microscopic, random, and unclonable disorder of physical media for such security tasks has recently gained increasing attention. Wherever applicable, the harnessing of disorder can lead to intriguing advantages: First, it can avoid the permanent storage of digital secret keys in vulnerable hardware, promising to make the resulting systems more resilient against invasive and malware attacks. Second, random physical disorder has the natural feature of being very hard to clone and to forge: Fully controlling the micro- and nanoscale fabrication variations in physical media is extremely difficult and, even if possible, prohibitively expensive. Third, utilization of the natural disorder and entropy in physical systems can sometimes enable cryptographic protocols whose security does not rest on the usual unproven number-theoretic assumptions like factoring and discrete log, creating an alternate foundation for cryptography. Physical Unclonable Functions or PUFs are perhaps the best known representative of this new class of “disordered” cryptoprimitives, but there are also others. In this chapter, we provide a classification for past and ongoing work in physical disorder based security alongside with security analyses and implementation examples. We will also outline some open problems and future research opportunities in the area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
SHIC PUFs are to be pronounced as “chique PUFs” according to [10].
References
Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Computer and Communication Security Conference
Gassend B (2003) Physical random functions, Master’s thesis, Massachusetts Institute of Technology
Suh G, O’Donnell C, Devadas S (2007) AEGIS: a Single-Chip secure processor. IEEE Design Test Comput 24(6): 570–580
Yin C, Qu G (2010) LISA: maximizing RO PUF’s secret extraction. In: Hardware-Oriented Security and Trust (HOST), pp 100–105
Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly PUF protecting IP on every FPGA. In: Hardware-Oriented Security and Trust (HOST), pp 67–70
Maes R, Tuyls P, Verbauwhede I (2009) Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Cryptographic Hardware and Embedded Systems (CHES), pp 332–347
Yu M-DM, Devadas S (2010) Secure and robust error correction for physical unclonable functions. In: IEEE Design Test Comput 27: 48–65
Majzoobi M, Koushanfar F, Devadas S (2010) FPGA PUF using programmable delay lines. In: IEEE Workshop on Information Forensics and Security, in press
Majzoobi M, Koushanfar F (2011) Time-bounded authentication of FPGAs. In: Under Revision for IEEE Transactions on Information Forensics and Security (TIFS)
Rührmair U, Jaeger C, Hilgers C, Algasinger M, Csaba G, Stutzmann M (2010) Security applications of diodes with unique current–voltage characteristics. In: Financial Cryptography and Data Security (FC), pp 328–335
Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference (DAC), pp 9–14
Sadeghi A, Naccache D (eds) (2010) Towards Hardware-Intrinsic Security: Foundations and Practice. Springer, Berlin, Heidelberg, New York
Kirovski D (2010) Anti-counterfeiting: mixing the physical and the digital world. In: Sadeghi A-R, Naccache D (eds) Towards Hardware-Intrinsic Security. Springer, Berlin, Heidelberg, New York, pp 223–233
Li S, Jain A (eds) (2009) Encyclopedia of Biometrics. Springer, USA
Maltoni D, Maio D, Jain A, Prabhakar S (2009) Handbook of Fingerprint Recognition. Springer, London
Kirovski D (2008) Personal communication, Dagstuhl, Germany
Graybeal S, McFate P (1989) Getting out of the STARTing block. Scient Am (USA) 261(6): 64–65
Bauder D (1983) An anti-counterfeiting concept for currency systems. Research report PTK-11990. Sandia National Laboratories, Albuquerque, N.M
Brosow J, Furugard E (1980) Method and a system for verifying authenticity safe against forgery. US Patent 4,218,674
Simmons G (1984) A system for verifying user identity and authorization at the point-of sale or access. Cryptologia 8(1): 1–21
——, (1991) Identification of data, devices, documents and individuals. In: IEEE International Carnahan Conference on Security Technology, pp 197–218
Buchanan J, Cowburn R, Jausovec A, Petit D, Seem P, Xiong G, Atkinson D, Fenton K, Allwood D, Bryan M (2005) Forgery:fingerprintingdocuments and packaging. Nature 436(7050): 475
Smith J, Sutherland A (1999) Microstructure based indicia. Proc Automatic Identification Adv Technol AutoID 99: 79–83
Métois E, Yarin P, Salzman N, Smith J (2002) FiberFingerprint identification. In: Workshop on Automatic Identification, pp 147–154
Seem P, Buchanan J, Cowburn R (2009) Impact of surface roughness on laser surface authentication signatures under linear and rotational displacements. Optic Lett 34(20): 3175–3177
Sharma A, Subramanian L, Brewer E (2008) Secure rural supply chain management using low cost paper watermarking. In: ACM SIGCOMM workshop on Networked systems for developing regions, pp 19–24
Beekhof F, Voloshynovskiy S, Koval O, Villan R, Pun T (2008) Secure surface identification codes. In: Proceedings of SPIE, vol 6819, p 68190D
Clarkson W, Weyrich T, Finkelstein A, Heninger N, Halderman J, Felten E (2009) Fingerprinting blank paper using commodity scanners. In: IEEE Symposium on Security and Privacy, pp 301–314
The ProteXXion System, Bayer AG, http://www.research.bayer.com/edition-19/protexxion.aspx and http://www.research.bayer.com/edition-19/19_Protexxion_en.pdfx
Ingeniatechnology, http://www.ingeniatechnology.com/
DeJean G, Kirovski D (2007) RF-DNA: Radio-frequency certificates of authenticity. Cryptographic Hardware and Embedded Systems (CHES), pp 346–363
Kirovski D (2004) Toward an automated verification of certificates of authenticity. In: ACM Electronic Commerce (EC), pp 160–169
Chen Y, Mihçak M, Kirovski D (2005) Certifying authenticity via fiber-infused paper. ACM SIGecom Exchanges 5(3): 29–37
Bulens P, Standaert F, Quisquater J (2010) How to strongly link data and its medium: the paper case. IET Information Security 4(3): 125–136
Kariakin Y (1995) Authentication of articles. Patent writing, WO/1997/024699, available from http://www.wipo.int/pctdb/en/wo.jsp?wo=1997024699
Hammouri G, Dana A, Sunar, B (2009) CDs have fingerprints too. Cryptographic Hardware and Embedded Systems (CHES), pp 348–362
Vijaywargi D, Lewis D, Kirovski D (2009) Optical DNA. Financial Cryptography and Data Security (FC), pp 222–229
Zhu B, Wu J, Kankanhalli M (2003) Print signatures for document authentication. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS). ACM, New York, pp 145–154
Collins J (2004) RFID fibers for secure applications. RFID J 26
RF SAW Inc. http://www.rfsaw.com/tech.html
Creo Inc. http://www.creo.com
Inkode Inc. http://www.inkode.com
Microtag Temed Ltd. http://www.microtag-temed.com/
CrossID Inc., Firewall Protection for Paper Documents. http://www.rfidjournal.com/article/articleview/790/1/44
Loibl C (2009) Entwurf und Untersuchung berührungslos abfragbarer einzigartiger Objekte. Master’s thesis, Fachgebiet Höchstfrequenztechnik, Technische Universität München
MagnePrint. http://www.magneprint.com/
Rührmair U, Stutzmann M, Lugli P, Jirauschek C, Müller K, Langhuth H, Csaba G, Biebl E, Finley J (2009) Method and system for security purposes. European Patent Application Nr. EP 09 157 041.6
Clelland C, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736): 533–534
Kirovski D (2005) A point-set compression heuristic for fiber-based certificates of authenticity. In: Data Compression Conference (DCC), pp 103–112
November AG., (2004) Point compression for certificates of authenticity. In: Data Compression Conference (DCC), p 545
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt. Springer, Berlin, Heidelberg, New York, pp 523–540
Alliance for Gray Market and Counterfeit Abatement (AGMA), http://www.agmaglobal.org/
Rührmair U, Sehnke F, Sölter J, Dror G, Devadas S, Schmidhuber J (2010) Modeling attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security (CCS), pp 237–249
Bennett C, Brassard G, Breidbart S, Wiesner S (1983) Quantum cryptography, or unforgeable subway tokens. In: Advances in Cryptology–Proceedings of Crypto, vol 82, pp 267–275
Bennett C, Brassard G et al. (1984) Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, vol 175. Bangalore, India
Guajardo J, Kumar S, Schrijen G, Tuyls P (2007) FPGA intrinsic PUFs and their use for IP protection. In: Cryptographic Hardware and Embedded Systems (CHES), pp 63–80
Lofstrom K, Daasch WR, Taylor D (2000) Ic identification circuit using device mismatch. In: ISSCC, pp 372–373
Layman P, Chaudhry S, Norman J, Thomson J (2002) Electronic fingerprinting of semiconductor integrated circuits. US Patent 6,738,294
Su Y, Holleman J, Otis B (2007) A 1.6pJ/bit 96 (percent) stable chip ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC), pp 200–201
Holcomb D, Burleson W, Fu K (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the Conference on RFID Security
Tuyls P, Schrijen G-J, Skoric B, van Geloven J, Verhaegh N, Wolters R (2006) Read-proof hardware from protective coatings. In: Cryptographic Hardware and Embedded Systems (CHES), pp 369–383
Helinski R, Acharyya D, Plusquellic J (2009) A physical unclonable function defined using power distribution system equivalent resistance variations. In: Design Automation Conference (DAC), pp 676–681
November AG., (2010) Quality metric evaluation of a physical unclonable function derived from an IC’s power distribution system. In: Design Automation Conference, ser. DAC, pp 240–243
Suh GE (2005) AEGIS: a Single-Chip Secure Processor. Ph.D. dissertation, Massachusetts Institute of Technology
Alkabani Y, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: USENIX Security Symposium, pp 291–306
Holcomb D, Burleson W, Fu K (2009) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9): 1198–1210
Pappu R (2001) Physical one-way functions. Ph.D. dissertation, Massachusetts Institute of Technology
Pappu R, Recht B, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297: 2026–2030
Gassend B, Clarke D, van Dijk M, Devadas S (2002) Controlled physical random functions. In: Annual Computer Security Applications Conference
Rührmair U, Sehnke F, Sölter J (2009) On the foundations of physical unclonable functions. Cryptology ePrint Archive, International Association for Cryptologic Research, Tech. Rep.
Rührmair U, Busch H, Katzenbeisser S (2010) Strong PUFs: models, constructions, and security proofs. In: Sadeghi A-R, Naccache D (eds) Towards Hardware-Intrinsic Security. Springer, Berlin, Heidelberg, New York, pp 79–96
Gassend B, Clarke D, van Dijk M, Devadas S (2003) Delay-based circuit authentication and applications. In: Symposium on Applied Computing (SAC)
Lee J-W, Lim D, Gassend B, Suh GE, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits with identification and authentication applications. In: IEEE VLSI Circuits Symposium, New-York
Lim D (2004) Extracting Secret Keys from Integrated Circuits. Master’s thesis, Massachusetts Institute of Technology, Cambridge, USA
Gassend B, Lim D, Clarke D, van Dijk M, Devadas S (2004) Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience 16(11): 1077–1098
Majzoobi M, Koushanfar F, Potkonjak M (2009) Techniques for design and implementation of secure reconfigurable pufs. ACM Trans Reconfig Technol Syst (TRETS) 2(1): 1–33
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: Proceedings of 2008 IEEE International Conference on RFID (RFID 2008), pp 58–64
Suzuki D, Shimizu K (2010) The Glitch PUF: a new delay-PUF architecture exploiting glitch shapes. Cryptographic Hardware and Embedded Systems (CHES), pp 366–382
Devadas S, Gassend B (2010) Authentication of integrated circuits. US Patent 7,840,803, application in 2002
Alkabani Y, Koushanfar F, Kiyavash N, Potkonjak M (2008) Trusted integrated circuits: a nondestructive hidden characteristics extraction approach. In: Information Hiding (IH), pp 102–117
Potkonjak M, Koushanfar F (2009) Identification of integrated circuits. US Patent Application 12/463,984; Publication Number: US 2010/0287604 A1
Koushanfar F, Boufounos P, Shamsi D (2008) Post-silicon timing characterization by compressed sensing. In: International Conference on Computer-Aided Design (ICCAD), pp 185–189
Shamsi D, Boufounos P, Koushanfar F (2008) Noninvasive leakage power tomography of integrated circuits by compressive sensing. In: International Symposium on Low Power Electronic Designs (ISLPED), pp 341–346
Nelson M, Nahapetian A, Koushanfar F, Potkonjak M (2009) Svd-based ghost circuitry detection. In: Information Hiding (IH), pp 221–234
Wei S, Meguerdichian S, Potkonjak M (2010) Gate-level characterization: foundations and hardware security applications. In: Design Automation Conference (DAC), pp 222–227
Koushanfar F, Mirhoseini A (2011) A unified framework for multimodal submodular integrated circuits trojan detection. In: IEEE Transactions on Information Forensic and Security (TIFS)
Csaba G, Ju X, Ma Z, Chen Q, Porod W, Schmidhuber J, Schlichtmann U, Lugli P, Ruhrmair U (2010) Application of mismatched cellular nonlinear networks for physical cryptography. In: International Workshop on Cellular Nanoscale Networks and their Applications (CNNA). IEEE, pp 1–6
Tuyls P, Škorić B (2007) Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp 133–148
Rührmair U (2011) SIMPL systems, or: can we construct cryptographic hardware without secret key information? In: International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM), ser. Lecture Notes in Computer Science, vol 6543. Springer, Berlin, Heidelberg, New York
Rührmair U, Jaeger C, Algasinger M (2011) An attack on PUF-based session key exchange and a hardware-based countermeasure. Financial Cryptography and Data Security (FC) to appear
Majzoobi M, Nably AE, Koushanfar F (2010) FPGA time-bounded authentication. In: Information Hiding Conference (IH), pp 1–15
Bekenstein J (2005) How does the entropy/information bound work? Found Phys 35(11): 1805–1823
Oztürk E, Hammouri G, Sunar B (2008) Towards robust low cost authentication for pervasive devices. In: Pervasive Computing and Communications (PerCom), pp 170–178
Majzoobi M, Koushanfar F, Potkonjak M (2008) Testing techniques for hardware security. In: International Test Conference (ITC), pp 1–10
November AG., (2008) Lightweight secure PUF. In: International Conference on Computer Aided Design (ICCAD), pp 670–673
Rührmair U, Jaeger C, Bator M, Stutzmann M, Lugli P, Csaba G Applications of high-capacity crossbar memories in cryptography, In IEEE Transactions on Nanotechnology, no. 99, p 1
Jaeger C, Algasinger M, Rührmair U, Csaba G, Stutzmann M (2010) Random pn-junctions for physical cryptography. Appl Phys Lett 96: 172103
Tuyls P, Skoric B, Stallinga S, Akkermans AHM, Ophey W (2005) Information-theoretic security analysis of physical uncloneable functions. In: Financial Cryptography and Data Security (FC), pp 141–155
Škorić B (2008) On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle. J Optics A Pure Appl Optic 10(5): 055304
Skoric B, Maubach S, Kevenaar T, Tuyls P (2009) Information-theoretic analysis of capacitive physical unclonable functions. J Appl Phys 100(2): 024902
Kim I, Maiti A, Nazhandali L, Schaumont P, Vivekraja V, Zhang H (2010) From statistics to circuits: foundations for future physical unclonable functions. Towards Hardware-Intrinsic Security, pp 55–78
Sehnke F, Schmidhuber J, Rührmair U (2010) Security benchmarks for strong physical unclonable functions, in submission
Gassend B, van Dijk M, Clarke D, Torlak E, Devadas S, Tuyls P (2008) Controlled physical random functions and applications. ACM Trans Inform Syst Secur (TISSEC), 10(4): 1–22
Yee BS (1994) Using secure coprocessors. Ph.D. dissertation, Carnegie Mellon University
Carroll A, Juarez M, Polk J, Leininger T (2002) Microsoft palladium: a business overview. In: Microsoft Content Security Business Unit, http://www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp
Alves T, Felton D (2004) Trustzone: Integrated Hardware and Software Security, ARM white paper
Microsoft, Next-Generation Secure Computing Base. http://www.microsoft.com/resources/ngscb/defaul.mspx
Group TC (2004) Tcg specification architecture overview revision 1.2. http://www.trustedcomputinggroup.com/home
Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J, Horowitz M (2000) Architectural support for copy and tamper resistant software. In: International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pp 168–177
Lie D (2003) Architectural support for copy and tamper-resistant software. Ph.D. dissertation, Stanford University, Menlo Park, CA, USA
Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S (2003) aegis: Architecture for tamper-evident and tamper-resistant processing. In: International Conference on Supercomputing (MIT-CSAIL-CSG-Memo-474 is an updated version)
Suh GE, O’Donnell CW, Sachdev I, Devadas S (2005) Design and implementation of the aegis single-chip secure processor using physical random functions. In: International Symposium on Computer Architecture (ISCA)
Devadas S (2008) Non-networked rfid puf authentication. US Patent Application 12/623,045
Oztiirk E, Hammouri G, Sunar B (2008) Towards robust low cost authentication for pervasive devices. In: International Conference on Pervasive Computing and Communications (PerCom), pp 170–178
Beckmann N, Potkonjak M (2009) Hardware-based public-key cryptography with public physically unclonable functions. In: Information Hiding. Springer, Berlin, Heidelberg, New York, pp 206–220
Potkonjak M (2009) Secure authentication. US Patent Application 12/464,387; Publication Number: US 2010/0293612 A1
November AG., (2009) Digital signatures. US Patent Application 12/464,384; Publication Number: US 2010/0293384 A1
Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: International Workshop on Information Hiding (IHW), pp 81–95
Koushanfar F, Potkonjak M (2007) Cad-based security, cryptography, and digital rights management. In: Design Automation Conference (DAC), pp 268–269
Potkonjak M, Meguerdichian S, Wong J (2010) Trusted sensors and remote sensing. In: IEEE Sensors, pp 1–4
Rührmair U, Stutzmann M, Csaba G, Schlichtmann U, Lugli P (2009) Method for security purposes. European Patent Filings EP 09003764.9, EP 09003763.1, EP 09157043.2
Rührmair U (2009) SIMPL Systems: on a public key variant of physical unclonable functions. Cryptology ePrint Archive, International Association for Cryptologic Research, Tech. Rep.
Rührmair U, Chen Q, Stutzmann M, Lugli P, Schlichtmann U, Csaba G (2009) Towards electrical, integrated implementations of simpl systems, cryptology ePrint archive. International Association for Cryptologic Research, Tech. Rep.
Chen Q, Csaba G, Ju X, Natarajan S, Lugli P, Stutzmann M, Schlichtmann U, Ruhrmair U (2009/2010) Analog circuits for physical cryptography. In: 12th International Symposium on Integrated Circuits (ISIC’09), IEEE. Singapore, 14–16 December 2009 pp 121–124
Rührmair U, Chen Q, Stutzmann M, Lugli P, Schlichtmann U, Csaba G (2010) Towards electrical, integrated implementations of simpl systems, In: Workshop in Information Security Theory and Practice (WISTP), pp 277–292
Chen Q, Csaba G, Lugli P, Schlichtmann U, Stutzmann M, Rührmair U (2011) Circuit-based approaches to SIMPL systems. J Circ Syst Comput 20: 107–123
Rührmair U (2011) SIMPL Systems as a Cryptographic and Security Primitive, In To be submitted to IEEE Trans. on Information Forensics and Security (TIFS)
Škorić B (2010) Quantum readout of physical unclonable functions. In: Progress in Cryptology–AFRICACRYPT 2010, pp 369–386
Ékoric B (2010) Quantum readout of physical unclonable functions. In: Progress in Cryptology (AFRICACRYPT), ser. Bernstein D, Lange T (eds) Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, New York, vol 6055, pp 369–386
Bösch C, Guajardo J, Sadeghi A, Shokrollahi J, Tuyls P (2008) Efficient helper data key extractor on FPGAs. In: Cryptographic Hardware and Embedded Systems (CHES), pp 81–197
Koushanfar F, Qu G (2001) Hardware metering. In: Design Automation Conference (DAC), ser. DAC, pp 490–493
Alkabani Y, Koushanfar F, Potkonjak M (2007 ) Remote activation of ICs for piracy prevention and digital right management. In: ICCAD
Rührmair U (2010) Oblivious transfer based on physical unclonable functions (extended abstract). In: Acquisti A, Smith SW, Sadeghi A-R (eds) TRUST, ser. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg, New York, pp 430–440
Acknowledgement
The authors would like to thank Prof. Wayne P. Burleson for his valuable comments and suggestions. The authors would also like to thank Azalia Mirhoseini for her help with some of the figures. Ulrich Rührmair and Farinaz Koushanfar have equally contributed to this book chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Rührmair, U., Devadas, S., Koushanfar, F. (2012). Security Based on Physical Unclonability and Disorder. In: Tehranipoor, M., Wang, C. (eds) Introduction to Hardware Security and Trust. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-8080-9_4
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8080-9_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-8079-3
Online ISBN: 978-1-4419-8080-9
eBook Packages: EngineeringEngineering (R0)