Skip to main content

Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

Physical Unclonable Functions (PUFs) is an emerging area, in the hardware security field. As a relatively new concept for computers and networks security, there is an ongoing research in various technologies. There are alternative proposed designs, so far, regarding different targets each time. This chapter is a state of the art, regarding the most important technologies, of PUFs designs. The alternative PUFs technologies are studied and analyzed, while the advantages of each one are highlighted. Furthermore, the silicon subclass of PUFs is detailed focused, since it is among the most important and widely applied. This is due to the fact that they can be easily implemented in a modern security system, with sufficient and flexible designs. Comparisons regarding implementation issues such as performance, area resources, and achieved security level are discussed in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., & Ruhrmair, U. (2011). The bistable ring PUF: A new architecture for strong physical unclonable functions. In IEEE international symposium on hardware-oriented security and trust—HOST 2011 (pp. 134–141). New York: IEEE.

    Chapter  Google Scholar 

  2. Gassend, B., Clarke, D., van Dijk, M., & Devadas, S. (2002). Silicon physical random functions. In Proceedings of the computer and communications security conference.

    Google Scholar 

  3. Guajardo, J., Kumar, S. S., Schrijen, G. J., & Tuyls, P. (2007). FPGA intrinsic PUFs and their use for IP protection. In Lecture notes in computer science (LNCS), Workshop on cryptographic hardware and embedded systems—CHES 2007 (Vol. 4727, pp. 63–80). Berlin: Springer.

    Google Scholar 

  4. Krishna, A., Narasimhan, S., Wang, X., & Bhunia, S. (2011). MECCA: a robust low overhead PUF using embedded memory array. In Lecture notes in computer science (LNCS), Workshop on cryptographic hardware and embedded systems—CHES 2011 (Vol. 6917, pp. 407–420). Berlin: Springer.

    Google Scholar 

  5. Lao, Y., & Parhi, K. (2011). Reconfigurable architectures for silicon physical unclonable functions. In IEEE international conference on electro/information technology—EIT 2011 (pp. 1–7). New York: IEEE.

    Google Scholar 

  6. Maes, R. (2013). Physically unclonable functions. New York: Springer.

    Book  MATH  Google Scholar 

  7. Majzoobi, M., Koushanfar, F., & Potkonjak, M. (2009). Techniques for design and implementation of secure reconfigurable PUFs. ACM Transactions on Reconfigurable Technology and Systems, 2(1), 1–33.

    Article  Google Scholar 

  8. Pappu, R. S. (2001). Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology (MIT), Cambridge, MA.

    Google Scholar 

  9. Rührmair, U., Jaeger, C., Hilgers, C., Algasinger, M., Csaba, G., & Stutzmann, M. (2010b). Security applications of diodes with unique current-voltage characteristics. In Lecture notes in computer science (LNCS), International conference on financial cryptography and data security—FC 2010 (Vol. 6052, pp. 328–335). Berlin: Springer.

    Google Scholar 

  10. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., & Schmidhuber, J. (2010a). Modeling attacks on physical unclonable functions. In ACM conference on computer and communications security—CCS 2010 (pp. 237–249). New York: ACM.

    Google Scholar 

  11. Rührmair, U., & van Dijk, M. (2013, May 19–22). PUFs in security protocols: attack models and security evaluations. In 2013 IEEE symposium on security and privacy, San Francisco, CA.

    Google Scholar 

  12. Schrijen, G.-J., & van der Leest, V. (2012). Comparative analysis of SRAM memories used as PUF primitives. In Design, automation and test in Europe—DATE 2012 (pp. 1319–1324). New York: IEEE.

    Google Scholar 

  13. Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th design and technology of integrated systems in nano era (DTIS’11), Greece.

    Google Scholar 

  14. Sklavos, N. (2013, October 22–23). Securing communication devices via physical unclonable functions (PUFs). In Information security solutions Europe (isse’13) (pp. 253–261). Brussels: Springer.

    Google Scholar 

  15. Sklavos, N., Chaves, R., Di Natale, G., & Regazzoni, F. (2017). Hardware security and trust. Cham: Springer.

    Book  Google Scholar 

  16. Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security (IJNS), Science Publications, 2(1), 14–20.

    Google Scholar 

  17. Suh, G. E., & Devadas, S. (2007). Physical unclonable functions for device authentication and secret key generation. In Design automation conference—DAC 2007 (pp. 9–14). New York: ACM.

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is supported under the framework of EU COST IC 1403: CRYPTACUS (Cryptanalysis of Ubiquitous Computing Systems) Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ioannis Papakonstantinou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Papakonstantinou, I., Sklavos, N. (2018). Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics