Advertisement

Hardware Intrinsic Security from Physically Unclonable Functions

  • Helena HandschuhEmail author
  • Geert-Jan Schrijen
  • Pim Tuyls
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

Counterfeiting of goods in general and of electronic goods in particular is a growing concern with a huge impact on the global economy, the society, and the security of its critical infrastructure. Various examples are known where companies suffer from economic and brand damage due to competition with counterfeit goods. In some cases the use of counterfeit components has even led to tragic accidents in which lives were lost. It has also recently become clear that counterfeit products can penetrate the critical and security infrastructure of our modern societies and hence cause a threat to national security.

Keywords

Smart Card Compression Function Static Random Access Memory Physical Attack Physical Unclonable Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    F. Armknecht, R. Maes, A.R. Sadeghi, B. Sunar, P. Tuyls, in Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Proceedings of ASIACRYPT 2009. Lecture Notes in Computer Science, vol 5912, (Springer, 2009) pp. 685–702Google Scholar
  2. 2.
    C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, P. Tuyls, in Efficient Helper Data Key Extractor on FPGAs. Proceedings of CHES 2008. Lecture Notes in Computer Science, vol. 5154 (Springer, Heidelberg, 2008), pp. 181–197Google Scholar
  3. 3.
    B. Gassend, D.E. Clarke, M. van Dijk, S. Devadas, in Controlled Physical Random Functions. Proceedings of the18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, 9–13 Dec 2002 (IEEE Computer Society, Washington, DC, 2002), pp. 149–160Google Scholar
  4. 4.
    M.A. Gora, A. Maiti, P. Schaumont, in A Flexible Design Flow for Software IP Binding in Commodity FPGA. IEEE Fourth International Symposium on Industrial Embedded Systems - SIES 2009, Ecole Polytechnique Federale de Lausanne, Switzerland, 8–10 July 2009 (IEEE, Piscataway, NJ, 2009) pp. 211–218Google Scholar
  5. 5.
    J. Guajardo, S.S. Kumar, G.-J. Schrijen, P. Tuyls, FPGA intrinsic PUFs and their use for IP protection, in Cryptographic Hardware and Embedded Systems - CHES 2007, ed. by P. Paillier, I. Verbauwhede. Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 Sept 2007. Lecture Notes in Computer Science, vol. 4727, (Springer, Berlin, Heidelberg, 2007), pp. 63–80CrossRefGoogle Scholar
  6. 6.
    J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in Brand and IP Protection with Physical Unclonable Functions. IEEE International Symposium on Circuits and Systems - ISCAS 2008, 18–21 May (IEEE, Piscataway, NJ 2008), pp. 3186–3189Google Scholar
  7. 7.
    J. Guajardo, B. Skoric, S.S. Kumar, T. Bel, A.H.M. Blom, G.J. Schrijen, â̂IJAnti-counterfeiting, key distribution and key storage in an ambient world via physical unclonable functions. Inf. Syst. Front. 11(1), 19–41 (2009).CrossRefGoogle Scholar
  8. 8.
    T. Jun, Circuit Approaches to Physical Cryptography. Diploma thesis, Technische Universitaet Muenchen, 2009Google Scholar
  9. 9.
    S.S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, P. Tuyls, in The Butterfly PUF: Protecting IP on Every FPGA, ed. by M. Tehranipoor, J. Plusquellic. Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, 9 June 2008 (IEEE Computer Society, Washington, DC, 2008), pp. 67–70CrossRefGoogle Scholar
  10. 10.
    K. Kursawe, A.R. Sadeghi, D. Schellekens, B. Skoric, P. Tuyls, in Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage. 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), San Francisco CA, USA, 27 July 2009 (IEEE, Piscataway, NJ, 2009), pp. 22–29Google Scholar
  11. 11.
    J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, in A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. Proceedings of the IEEE VLSI Circuits Symposium, Honolulu, HI, June 2004, pp. 176–179Google Scholar
  12. 12.
    D. Lim, Extracting Secret Keys from Integrated Circuits. Master thesis, Massachusetts Institute of Technology, May 2004Google Scholar
  13. 13.
    R. Maes, P. Tuyls, I. Verbauwhede, in Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. 3rd Benelux Workshop on Information and System Security (WISSec 2008) Eindhoven, The Netherlands, 13–14 Nov 2008 17 pagesGoogle Scholar
  14. 14.
    R. Maes, P. Tuyls, I. Verbauwhede, in Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. Proceedings of CHES 2009, Lecture Notes in Computer Science, vol. 5747 (Springer, Berlin, Heidelberg, 2009), pp. 332–347Google Scholar
  15. 15.
    C.W. O’Donnell, G.E. Suh, S. Devadas, PUF-Based Random Number Generation, CSAIL CSG Technical Memo 481, Massachusetts Institute of Technology, Mar 2001Google Scholar
  16. 16.
    R.S. Pappu, Physical One-Way Functions. Ph.D. thesis, Massachusetts Institute of Technology, Mar 2001Google Scholar
  17. 17.
    B. Skoric, G.-J. Schrijen, W. Ophey, R. Wolters, N. Verhaegh, J. van Geloven, Experimental hardware for coating PUFs and optical PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, ed. by P. Tuyls, B. Skoric, T. Kevenaar (Springer, London, 2007), pp. 255–268CrossRefGoogle Scholar
  18. 18.
    B. Skoric, P. Tuyls, W. Ophey, in Robust Key Extraction from Physical Unclonable Functions. Applied Cryptography and Network Security (ACNS) 2005, Lecture Notes in Computer Science, vol. 3531 (Springer, Heidelberg, 2005), pp. 407–422Google Scholar
  19. 19.
    G.E. Su, S. Devadas, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, 4–8 June, (IEEE, Piscataway, NJ, 2007), pp. 9–14Google Scholar
  20. 20.
    P. Tuyls, G.J. Schrijen, F. Willems, T. Ignatenko, Secure key storage with PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ed. by P. Tuyls, B. Skoric, T. Kevenaar. (Springer, London, 2007), pp. 269–292CrossRefGoogle Scholar
  21. 21.
    P. Tuyls, B. Skoric, T. Kevenaar, Security with Noisy Data. Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, London, 2007)CrossRefGoogle Scholar
  22. 22.
    P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of the Eighth International Workshop on Cryptographic Hardware and Embedded Systems (CHES ’06), Yokohama, Japan, 10–13 Oct, pp. 369–383Google Scholar
  23. 23.
    P. Tuyls, B. Skoric, S. Stallinga, A.H.M. Akkermans, W. Ophey, Information-theoretic security analysis of physical unclonable functions. in Financial Cryptography and Data Security, ed. by A.S. Patrick, M. Yung. 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, 28 Febr –3 Mar 2005. Revised Papers, Lecture Notes in Computer Science, vol. 3570 (Springer, Berlin, Heidelberg, 2005), pp. 141–155CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Helena Handschuh
    • 1
    • 2
    Email author
  • Geert-Jan Schrijen
    • 3
  • Pim Tuyls
    • 3
    • 4
  1. 1.Intrinsic-IDSan JoseUSA
  2. 2.ESAT-COSIC, Katholieke Universiteit LeuvenLeuvenBelgium
  3. 3.Intrinsic-IDEindhovenThe Netherlands
  4. 4.ESAT/COSIC and IBBT, Catholic University of LeuvenLeuvenBelgium

Personalised recommendations