Abstract
Physical Unclonable Functions (PUFs) are functions embodied in physical structures which are easy to evaluate but hard to predict. Furthermore implementations are practically impossible to duplicate, even if the exact manufacturing process is known and available. As a consequence, security architectures based on PUFs promise inherent unclonability, physical tamper resistance and secure establishment of device-unique cryptographic keys. Well-known bare silicon PUFs aim at the security of the circuit itself but do not grant tamper resistance to the card in which it is embedded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literature
Bösch, Christoph and Guajardo, Jorge and Sadeghi, Ahmad-Reza and Shokrollahi and Tuyls, Pim. Efficient helper data key extractor on FPGAs. In Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’08, Washington, DC, USA. Springer, 2008.
Buchanan, James D. R.; Cowburn, Russel P.; Jausovec, Anna-Vanessa; Petit, Dorothée; Seem, Peter; Xiong, Gang; Atkinson, Del; Fenton, Kate; Allwood, Dan A.; Bryan, Matthew T.: Fingerprinting’ documents and packaging. Nature, vol. 436, p. 475, 2005.
R. Carminati, Rémi: Subwavelength spatial correlations in near-field speckle patterns. Phys. Rev. A, vol. 81, p. 053804, 2010.
Chen, Qingqing and Csaba, Gyorgy and Lugli, Paolo and Schlichtmann, Ulf and Rührmair, Ulrich. The bistable ring PUF: a new architecture for strong physical unclonable functions. IEEE International Symposium on Hardware-Oriented Security and Trust, HOST’11, San Diego, CA, USA. IEEE, 2011.
Cova S. and Ghioni M. and Lotito A. and Rech I. and Zappa F. Evolution and prospects for single- photon avalanche diodes and quenching circuits. In Journal of Modern Optics, vol. 51, no. 9-10, Taylor & Francis Group, 2004.
Dodis, Yevgeniy and Rayzin, Leonid and Smith, Adam. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT’04, Interlaken, Switzerland. Springer, 2004.
Goodman, Joseph: Statistical Optics, Wiley, 1985.
Gassend, Blaise and Clarke, Dwaine and van Dijk, Marten and Devadas, Srinivas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS’02, Washington, DC, USA. ACM, 2002.
Gassend, Blaise and Clarke, Dwaine and van Dijk, Marten and Devadas, Srinivas. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC’02. IEEE, 2002.
Guajardo, Jorge and Kumar, Sandeep S. and Schrijen, Geert Jan and Tuyls, Pim. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’07, Vienna, Austria. Springer, 2007.
Hiller, Matthias and Merli, Dominik and Stumpf, Frederic and Sigl, Georg. Complementary IBS: application specific error correction for PUFs. IEEE International Symposium on Hardware- Oriented Security and Trust, HOST’10, San Francisco, CA, USA. IEEE, 2012.
Lim, Daihyun and Lee, Jae W. and Gassend, Blaise and Suh, G. Edward and van Dijk, Marten and Devadas, Srinivas. Extracting secret keys from integrated circuits. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, volume 13, no 10, pages 1200-1205. IEEE, 2005.
Moharam, M. G. and Grann, E. B., and Pommet, D. A.: Formulation for stable and efficient implementation of the rigorous coupled-wave analysis of binary gratings. Journal of the Optical Society of America, vol. 12, pp. 1068-1076, 1995.
Merli, Dominik and Schuster, Dieter and Stumpf, Frederic and Sigl, Georg: Side-channel analysis of PUFs and Fuzzy Extractors. In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST’11, Pittsburgh, PA, USA. Springer, 2011.
Merli, Dominik and Schuster, Dieter and Stumpf, Frederic and Sigl, Georg: Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In Proceedings of the 6th Workshop on Embedded Systems Security, WESS’11, Taipei, Taiwan. ACM, 2011.
Pappu, Ravikanth and Recht, Ben and Taylor, Jason and Gershenfeld, Neil. Physical one-way functions. Science, vol. 297, no. 5589, pp. 2026-2030, September 2002.
Rührmair, Ulrich and Sehnke, Frank and Sölter, Jan and Dror, Gideon and Devadas, Srinivas and Schmidhuber, Jürgen. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, IL, USA. ACM, 2010.
Suh, G. Edward and Devadas, Srinivas. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Design Automation Conference, DAC’07, San Diego, CA, USA. ACM/IEEE, 2007.
Skoric, Boris and Makkes, Marc. Flowchart description of security primitives for controlled physical unclonable functions. International Journal of Information Security, vol. 9, pp. 327- 335. Springer, 2010.
Tuyls, Pim and Skoric, Boris. Strong authentication with physical unclonable functions. In Security, Privacy and Trust in Modern Data Management, M. Petkovic and W. Jonker (Eds.). Springer, 2007.
Tuyls, P.; Skoric, B.; Stallinga, S.; Akkermans, A.H.M.; Ophey, W.: Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Crypto, vol. 3570, p.578, 2005.
Tuyls, Pim and Schrijen, Geert-Jan and Skoric, Boris and van Geloven, Jan and Verhaegh, Nynke and Wolters, Rob. Read-proof hardware from protective coatings. In Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES’06, Yokohama, Japan. Springer, 2006.
Yu, Mend-Day (Mandel) and Devadas, Srinivas. Secure and robust error correction for physical unclonable functions. IEEE Design and Test of Computers, vol. 27, no. 1, pp. 48-65. IEEE, 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Esbach, T., Fumy, W., Kulikovska, O., Merli, D., Schuster, D., Stumpf, F. (2012). A New Security Architecture for Smartcards Utilizing PUFs. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_18
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)