Skip to main content

A New Security Architecture for Smartcards Utilizing PUFs

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

Physical Unclonable Functions (PUFs) are functions embodied in physical structures which are easy to evaluate but hard to predict. Furthermore implementations are practically impossible to duplicate, even if the exact manufacturing process is known and available. As a consequence, security architectures based on PUFs promise inherent unclonability, physical tamper resistance and secure establishment of device-unique cryptographic keys. Well-known bare silicon PUFs aim at the security of the circuit itself but do not grant tamper resistance to the card in which it is embedded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Bösch, Christoph and Guajardo, Jorge and Sadeghi, Ahmad-Reza and Shokrollahi and Tuyls, Pim. Efficient helper data key extractor on FPGAs. In Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’08, Washington, DC, USA. Springer, 2008.

    Google Scholar 

  2. Buchanan, James D. R.; Cowburn, Russel P.; Jausovec, Anna-Vanessa; Petit, Dorothée; Seem, Peter; Xiong, Gang; Atkinson, Del; Fenton, Kate; Allwood, Dan A.; Bryan, Matthew T.: Fingerprinting’ documents and packaging. Nature, vol. 436, p. 475, 2005.

    Google Scholar 

  3. R. Carminati, Rémi: Subwavelength spatial correlations in near-field speckle patterns. Phys. Rev. A, vol. 81, p. 053804, 2010.

    Google Scholar 

  4. Chen, Qingqing and Csaba, Gyorgy and Lugli, Paolo and Schlichtmann, Ulf and Rührmair, Ulrich. The bistable ring PUF: a new architecture for strong physical unclonable functions. IEEE International Symposium on Hardware-Oriented Security and Trust, HOST’11, San Diego, CA, USA. IEEE, 2011.

    Google Scholar 

  5. Cova S. and Ghioni M. and Lotito A. and Rech I. and Zappa F. Evolution and prospects for single- photon avalanche diodes and quenching circuits. In Journal of Modern Optics, vol. 51, no. 9-10, Taylor & Francis Group, 2004.

    Google Scholar 

  6. Dodis, Yevgeniy and Rayzin, Leonid and Smith, Adam. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT’04, Interlaken, Switzerland. Springer, 2004.

    Google Scholar 

  7. Goodman, Joseph: Statistical Optics, Wiley, 1985.

    Google Scholar 

  8. Gassend, Blaise and Clarke, Dwaine and van Dijk, Marten and Devadas, Srinivas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS’02, Washington, DC, USA. ACM, 2002.

    Google Scholar 

  9. Gassend, Blaise and Clarke, Dwaine and van Dijk, Marten and Devadas, Srinivas. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC’02. IEEE, 2002.

    Google Scholar 

  10. Guajardo, Jorge and Kumar, Sandeep S. and Schrijen, Geert Jan and Tuyls, Pim. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’07, Vienna, Austria. Springer, 2007.

    Google Scholar 

  11. Hiller, Matthias and Merli, Dominik and Stumpf, Frederic and Sigl, Georg. Complementary IBS: application specific error correction for PUFs. IEEE International Symposium on Hardware- Oriented Security and Trust, HOST’10, San Francisco, CA, USA. IEEE, 2012.

    Google Scholar 

  12. Lim, Daihyun and Lee, Jae W. and Gassend, Blaise and Suh, G. Edward and van Dijk, Marten and Devadas, Srinivas. Extracting secret keys from integrated circuits. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, volume 13, no 10, pages 1200-1205. IEEE, 2005.

    Google Scholar 

  13. Moharam, M. G. and Grann, E. B., and Pommet, D. A.: Formulation for stable and efficient implementation of the rigorous coupled-wave analysis of binary gratings. Journal of the Optical Society of America, vol. 12, pp. 1068-1076, 1995.

    Google Scholar 

  14. Merli, Dominik and Schuster, Dieter and Stumpf, Frederic and Sigl, Georg: Side-channel analysis of PUFs and Fuzzy Extractors. In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST’11, Pittsburgh, PA, USA. Springer, 2011.

    Google Scholar 

  15. Merli, Dominik and Schuster, Dieter and Stumpf, Frederic and Sigl, Georg: Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In Proceedings of the 6th Workshop on Embedded Systems Security, WESS’11, Taipei, Taiwan. ACM, 2011.

    Google Scholar 

  16. Pappu, Ravikanth and Recht, Ben and Taylor, Jason and Gershenfeld, Neil. Physical one-way functions. Science, vol. 297, no. 5589, pp. 2026-2030, September 2002.

    Google Scholar 

  17. Rührmair, Ulrich and Sehnke, Frank and Sölter, Jan and Dror, Gideon and Devadas, Srinivas and Schmidhuber, Jürgen. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, IL, USA. ACM, 2010.

    Google Scholar 

  18. Suh, G. Edward and Devadas, Srinivas. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Design Automation Conference, DAC’07, San Diego, CA, USA. ACM/IEEE, 2007.

    Google Scholar 

  19. Skoric, Boris and Makkes, Marc. Flowchart description of security primitives for controlled physical unclonable functions. International Journal of Information Security, vol. 9, pp. 327- 335. Springer, 2010.

    Google Scholar 

  20. Tuyls, Pim and Skoric, Boris. Strong authentication with physical unclonable functions. In Security, Privacy and Trust in Modern Data Management, M. Petkovic and W. Jonker (Eds.). Springer, 2007.

    Google Scholar 

  21. Tuyls, P.; Skoric, B.; Stallinga, S.; Akkermans, A.H.M.; Ophey, W.: Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Crypto, vol. 3570, p.578, 2005.

    Google Scholar 

  22. Tuyls, Pim and Schrijen, Geert-Jan and Skoric, Boris and van Geloven, Jan and Verhaegh, Nynke and Wolters, Rob. Read-proof hardware from protective coatings. In Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’06, Yokohama, Japan. Springer, 2006.

    Google Scholar 

  23. Yu, Mend-Day (Mandel) and Devadas, Srinivas. Secure and robust error correction for physical unclonable functions. IEEE Design and Test of Computers, vol. 27, no. 1, pp. 48-65. IEEE, 2010.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Esbach .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Esbach, T., Fumy, W., Kulikovska, O., Merli, D., Schuster, D., Stumpf, F. (2012). A New Security Architecture for Smartcards Utilizing PUFs. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_18

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics