The cryptographic protocols that we use in everyday life rely on the secure storage of keys in consumer devices. Protecting these keys from invasive attackers, who open a device to steal its key, is a challenging problem. We propose controlled physical random functions1 (CPUFs) as an alternative to digital key storage, and we describe the core protocols that are needed to use CPUFs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
Gassend, B., van Dijk, M., Clarke, D., Devadas, S. (2007). Controlled Physical Random Functions. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds) Security with Noisy Data. Springer, London. https://doi.org/10.1007/978-1-84628-984-2_14
Download citation
DOI: https://doi.org/10.1007/978-1-84628-984-2_14
Publisher Name: Springer, London
Print ISBN: 978-1-84628-983-5
Online ISBN: 978-1-84628-984-2
eBook Packages: Computer ScienceComputer Science (R0)