Skip to main content

Secure Key Generator Using a Loop-PUF

  • Chapter
  • First Online:
Trusted Computing for Embedded Systems

Abstract

In this chapter, we describe a secret key generator which uses a Physically Unclonable Function: the Loop-PUF (LPUF). After a short description of this latter, we will describe the concept and the architecture of our secure key generator (PUFKY). We will detail all its components and all the security analysis we made. We will finally show that the LPUF, if its location is well chosen, has sufficient properties to be used as a robust and secure key generator. More generally, this chapter will allow the reader to implement a PUFKY quickly from scratch.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cherif, Z., Danger, J.L., Guilley, S., Bossuet, L.: An easy-to-design PUF based on a single oscillator: the loop PUF. In: 2012 15th Euromicro Conference on Digital System Design (DSD), Cesme, pp. 156–162. IEEE (2012)

    Google Scholar 

  2. Handschuh, H., Schrijen, G.J., Tuyls, P.: Hardware intrinsic security from physically unclonable functions. In: Towards Hardware-Intrinsic Security, pp. 39–53. Springer, Berlin/Heidelberg (2010)

    Google Scholar 

  3. Hori, Y., Yoshida, T., Katashita, T., Satoh, A.: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: 2010 International Conference on Reconfigurable Computing and FPGAs (ReConFig), Cancun, pp. 298–303. IEEE (2010)

    Google Scholar 

  4. Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Cryptographic Hardware and Embedded Systems–CHES 2012, Leuven, pp. 302–319. Springer (2012)

    Google Scholar 

  5. Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, pp. 3–37. Springer, Berlin/Heidelberg (2010)

    Google Scholar 

  6. Morelos-Zaragoza, R.H.: The Art of Error Correcting Coding. John Wiley & Sons (2006)

    Google Scholar 

  7. Roel, M.: Physically unclonable functions: constructions, properties and applications. Ph.D. thesis, Dissertation, University of KU Leuven (2012)

    Google Scholar 

  8. Ruhrmair, U., Devadas, S., Koushanfar, F.: Security Based on Physical Unclonability and Disorder. Springer, New York (2011)

    Google Scholar 

Download references

Acknowledgements

Without the devotion and the hard work of Arnaud Lebrun under the supervision of Florentin Demetrescu (Airbus Defence and Space − CyberSecurity), this chapter would have never been written. We also thank Florent Lozac’h, Zouha Cherif and Jean-Luc Danger (Télécom ParisTech/Secure-IC) for providing their LPUF IP and insightful discussions.

This chapter is also dedicated to Cédric Blancher (1976–2013\(\dag \)), a world expert in computer security and colleague from Airbus Group Innovations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Julien Francq .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Francq, J., Parlier, G. (2015). Secure Key Generator Using a Loop-PUF. In: Candaele, B., Soudris, D., Anagnostopoulos, I. (eds) Trusted Computing for Embedded Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-09420-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09420-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09419-9

  • Online ISBN: 978-3-319-09420-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics