Skip to main content

Information-Theoretic Security Analysis of Physical Uncloneable Functions

  • Conference paper
Financial Cryptography and Data Security (FC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3570))

Included in the following conference series:

Abstract

We propose a general theoretical framework to analyze the security of Physical Uncloneable Functions (PUFs). We apply the framework to optical PUFs. In particular we present a derivation, based on the physics governing multiple scattering processes, of the number of independent challenge-response pairs supported by a PUF. We find that the number of independent challenge-response pairs is proportional to the square of the thickness of the PUF and inversely proportional to the scattering length and the wavelength of the laser light. We compare our results to those of Pappu and show that they coincide in the case where the density of scatterers becomes very high.Finally, we discuss some attacks on PUFs, and introduce the Slow PUF as a way to thwart brute force attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gassend, B., et al.: Controlled Physical Random Functions. In: Proc. 18th Annual Computer Security Applications Conf. (December 2002)

    Google Scholar 

  2. Gassend, B., et al.: Silicon Physical Unknown Functions. In: Proc. 9th ACM Conf. on Computer and Communications Security (November 2002)

    Google Scholar 

  3. Pappu, R.: Physical One-Way Functions, Ph.D. thesis, MIT (2001)

    Google Scholar 

  4. Pappu, R., et al.: Physical One-Way Functions. Science 297, 20–26 (2002)

    Article  Google Scholar 

  5. Gassend, B.L.P.: Physical Random Functions, Master’s Thesis, MIT (2003)

    Google Scholar 

  6. Tuyls, P., Škorić, B.: Secret Key Generation from Classical Physics. In: Proceedings of the Hardware Technology Drivers for Ambient Intelligence Symposium. Philips Research Book Series. Kluwer, Dordrecht (2005)

    Google Scholar 

  7. Magnor, M., Dorn, P., Rudolph, W.: Simulation of confocal microscopy through scattering media with and without time gating. J. Opt. Soc. Am. B 19(11), 1695–1700 (2001)

    Article  Google Scholar 

  8. de Boer, J.F.: Optical Fluctuations on the Transmission and Reflection of Mesoscopic Systems, Ph D thesis, Amsterdam (1995)

    Google Scholar 

  9. Furstenberg, H.: Noncommuting Random Matrices. Trans. Am. Math. Soc. 108, 377 (1963)

    Article  MATH  MathSciNet  Google Scholar 

  10. Linnartz, J.P., Tuyls, P.: New Shielding Functions to enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Verbitskiy, E., Tuyls, P., Denteneer, D., Linnartz, J.P.: Reliable Biometric Authentication with Privacy Protection. In: Proc. of the 24th Symposium on Information Theory in the Benelux

    Google Scholar 

  12. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley & Sons, New York (1991)

    Book  MATH  Google Scholar 

  13. Petersen, K.: Ergodic Theory. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  14. Gabor, D.: Light and Information. In: Wolf, E. (ed.) Progress in Optics, vol. I. North-Holland, Amsterdam (1961)

    Google Scholar 

  15. Goodman, J.W.: Statistical properties of laser speckle patterns. In: Dainty, J.C. (ed.) Laser Speckle and Related Phenomena, 2nd edn. Springer, New York (1984)

    Google Scholar 

  16. Feng, S., Kane, C., Lee, P.A., Stone, A.D.: Correlations and Fluctuations of Coherent Wave Transmission through Disordered Media. Phys. Rev. Lett. 61(7), 834–837 (1988)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tuyls, P., Škorić, B., Stallinga, S., Akkermans, A.H.M., Ophey, W. (2005). Information-Theoretic Security Analysis of Physical Uncloneable Functions. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_15

Download citation

  • DOI: https://doi.org/10.1007/11507840_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26656-3

  • Online ISBN: 978-3-540-31680-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics