Physical unclonable functions (PUFs)

A. Sengupta, S. Mohanty
{"title":"Physical unclonable functions (PUFs)","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_ch12","DOIUrl":null,"url":null,"abstract":"It has been the practice to store information under lock and key for safeguarding it. Even today, we use cryptographic primitives to store information securely under lock and key, encryption, and decryption. For the process of cryptography, keys are necessary for any operation. But these keys should be stored in the memory so that they can be used whenever necessary. When a key is stored in the memory, it can be stolen by the adversary using various methods. Therefore, storing it in a nonvolatile memory is not an option in this age of security threats. Physical unclonable functions (PUFs) are the promising security primitives used for generating the keys instead of storing them in the memory. These modules use the naturally occurring manufacturing variations in the fabrication process for generating the keys for cryptographic purposes. This chapter discusses different types of PUFs. Section 12.1 gives a brief introduction of PUFs. Section 12.2 discusses working principles of PUFs. Section 12.3 discusses different characteristics of a PUF design. Section 12.4 presents different classifications of PUFs. Various designs of PUF based on ring oscillators (ROs) are presented in Section 12.5, based on multiplexers and reconfigurability are presented in Section 12.6. Static random access memory (SRAM)-based PUFs are presented in Section 12.7, memristor-based PUFs are presented in Section 12.8, and diode-based PUFs are presented in Section 12.9. There are also non-silicon-based PUF designs, such as carbon PUFs, presented in Section 12.10. Microprocessors can also be used for implementing the PUF designs which are presented in Section 12.11. Magnetic material-based PUFs are presented in Section 12.12 and the FPGA implementations of PUF and security measures for FPGA are presented in Section 12.13. Some case study applications are presented in Section 12.14. Further the issues and challenges faced during the design of PUF modules are presented in Section 12.15. The conclusion and future directions are presented in Section 12.16.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBCS060E_ch12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

It has been the practice to store information under lock and key for safeguarding it. Even today, we use cryptographic primitives to store information securely under lock and key, encryption, and decryption. For the process of cryptography, keys are necessary for any operation. But these keys should be stored in the memory so that they can be used whenever necessary. When a key is stored in the memory, it can be stolen by the adversary using various methods. Therefore, storing it in a nonvolatile memory is not an option in this age of security threats. Physical unclonable functions (PUFs) are the promising security primitives used for generating the keys instead of storing them in the memory. These modules use the naturally occurring manufacturing variations in the fabrication process for generating the keys for cryptographic purposes. This chapter discusses different types of PUFs. Section 12.1 gives a brief introduction of PUFs. Section 12.2 discusses working principles of PUFs. Section 12.3 discusses different characteristics of a PUF design. Section 12.4 presents different classifications of PUFs. Various designs of PUF based on ring oscillators (ROs) are presented in Section 12.5, based on multiplexers and reconfigurability are presented in Section 12.6. Static random access memory (SRAM)-based PUFs are presented in Section 12.7, memristor-based PUFs are presented in Section 12.8, and diode-based PUFs are presented in Section 12.9. There are also non-silicon-based PUF designs, such as carbon PUFs, presented in Section 12.10. Microprocessors can also be used for implementing the PUF designs which are presented in Section 12.11. Magnetic material-based PUFs are presented in Section 12.12 and the FPGA implementations of PUF and security measures for FPGA are presented in Section 12.13. Some case study applications are presented in Section 12.14. Further the issues and challenges faced during the design of PUF modules are presented in Section 12.15. The conclusion and future directions are presented in Section 12.16.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物理不可克隆功能(puf)
为了保护信息安全,将信息存储起来是一种惯例。即使在今天,我们也使用加密原语在锁和密钥、加密和解密下安全地存储信息。对于密码学过程,密钥对于任何操作都是必需的。但是这些键应该存储在内存中,以便在需要的时候使用。当密钥存储在内存中时,攻击者可以使用各种方法窃取它。因此,在这个安全威胁的时代,将其存储在非易失性存储器中不是一个选择。物理不可克隆函数(puf)是一种很有前途的安全原语,用于生成密钥而不是将密钥存储在内存中。这些模块在制造过程中使用自然发生的制造变化来生成用于加密目的的密钥。本章讨论不同类型的puf。第12.1节简要介绍了puf。puf的工作原理请参见12.2。第12.3节讨论PUF设计的不同特征。第12.4节介绍puf的不同分类。第12.5节介绍了基于环形振荡器(ROs)的PUF的各种设计,第12.6节介绍了基于多路复用器和可重构性的PUF设计。基于静态随机存取存储器(SRAM)的puf将在第12.7节介绍,基于忆阻器的puf将在第12.8节介绍,基于二极管的puf将在第12.9节介绍。也有非硅基PUF设计,如第12.10节介绍的碳PUF。微处理器也可以用于实现第12.11节中介绍的PUF设计。基于磁性材料的PUF将在12.12节中介绍,PUF的FPGA实现和FPGA的安全措施将在12.13节中介绍。第12.14节介绍了一些案例研究应用。此外,在PUF模块的设计过程中所面临的问题和挑战将在12.15节中介绍。结论和未来的方向在12.16节中提出。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Structural obfuscation of DSP cores used in CE devices Security in consumer electronics and internet of things (IoT) Computational forensic engineering for resolving ownership conflict of DSP IP core Obfuscation of JPEG CODEC IP core for CE devices Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1