Abstract
In this chapter, we describe a secret key generator which uses a Physically Unclonable Function: the Loop-PUF (LPUF). After a short description of this latter, we will describe the concept and the architecture of our secure key generator (PUFKY). We will detail all its components and all the security analysis we made. We will finally show that the LPUF, if its location is well chosen, has sufficient properties to be used as a robust and secure key generator. More generally, this chapter will allow the reader to implement a PUFKY quickly from scratch.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cherif, Z., Danger, J.L., Guilley, S., Bossuet, L.: An easy-to-design PUF based on a single oscillator: the loop PUF. In: 2012 15th Euromicro Conference on Digital System Design (DSD), Cesme, pp. 156–162. IEEE (2012)
Handschuh, H., Schrijen, G.J., Tuyls, P.: Hardware intrinsic security from physically unclonable functions. In: Towards Hardware-Intrinsic Security, pp. 39–53. Springer, Berlin/Heidelberg (2010)
Hori, Y., Yoshida, T., Katashita, T., Satoh, A.: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: 2010 International Conference on Reconfigurable Computing and FPGAs (ReConFig), Cancun, pp. 298–303. IEEE (2010)
Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Cryptographic Hardware and Embedded Systems–CHES 2012, Leuven, pp. 302–319. Springer (2012)
Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, pp. 3–37. Springer, Berlin/Heidelberg (2010)
Morelos-Zaragoza, R.H.: The Art of Error Correcting Coding. John Wiley & Sons (2006)
Roel, M.: Physically unclonable functions: constructions, properties and applications. Ph.D. thesis, Dissertation, University of KU Leuven (2012)
Ruhrmair, U., Devadas, S., Koushanfar, F.: Security Based on Physical Unclonability and Disorder. Springer, New York (2011)
Acknowledgements
Without the devotion and the hard work of Arnaud Lebrun under the supervision of Florentin Demetrescu (Airbus Defence and Space − CyberSecurity), this chapter would have never been written. We also thank Florent Lozac’h, Zouha Cherif and Jean-Luc Danger (Télécom ParisTech/Secure-IC) for providing their LPUF IP and insightful discussions.
This chapter is also dedicated to Cédric Blancher (1976–2013\(\dag \)), a world expert in computer security and colleague from Airbus Group Innovations.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Francq, J., Parlier, G. (2015). Secure Key Generator Using a Loop-PUF. In: Candaele, B., Soudris, D., Anagnostopoulos, I. (eds) Trusted Computing for Embedded Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-09420-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-09420-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09419-9
Online ISBN: 978-3-319-09420-5
eBook Packages: EngineeringEngineering (R0)