PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

  • Stefan Katzenbeisser
  • Ünal Kocabaş
  • Vladimir Rožić
  • Ahmad-Reza Sadeghi
  • Ingrid Verbauwhede
  • Christian Wachsmann
Conference paper

DOI: 10.1007/978-3-642-33027-8_17

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7428)
Cite this paper as:
Katzenbeisser S., Kocabaş Ü., Rožić V., Sadeghi AR., Verbauwhede I., Wachsmann C. (2012) PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. In: Prouff E., Schaumont P. (eds) Cryptographic Hardware and Embedded Systems – CHES 2012. CHES 2012. Lecture Notes in Computer Science, vol 7428. Springer, Berlin, Heidelberg

Abstract

Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security features of PUFs are still under investigation: Evaluation results in the literature are difficult to compare due to varying test conditions, different analysis methods and the fact that representative data sets are publicly unavailable.

In this paper, we present the first large-scale security analysis of ASIC implementations of the five most popular intrinsic electronic PUF types, including arbiter, ring oscillator, SRAM, flip-flop and latch PUFs. Our analysis is based on PUF data obtained at different operating conditions from 96 ASICs housing multiple PUF instances, which have been manufactured in TSMC 65 nm CMOS technology. In this context, we present an evaluation methodology and quantify the robustness and unpredictability properties of PUFs. Since all PUFs have been implemented in the same ASIC and analyzed with the same evaluation methodology, our results allow for the first time a fair comparison of their properties.

Keywords

Physically Unclonable Functions (PUFs) ASIC implementation evaluation framework unpredictability robustness 
Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2012

Authors and Affiliations

  • Stefan Katzenbeisser
    • 1
  • Ünal Kocabaş
    • 1
  • Vladimir Rožić
    • 3
  • Ahmad-Reza Sadeghi
    • 2
  • Ingrid Verbauwhede
    • 3
  • Christian Wachsmann
    • 1
  1. 1.Technische Universität Darmstadt (CASED)Germany
  2. 2.Technische Universität Darmstadt and Fraunhofer SIT DarmstadtGermany
  3. 3.KU Leuven, ESAT/COSICLeuvenBelgium

Personalised recommendations