Skip to main content

FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs

  • Conference paper
  • First Online:

Abstract

Ring oscillator (RO) based physically unclonable function (PUF) on FPGAs is popular for its nice properties and easy implementation. The conventional compensated measurement though proved to be particularly effective in extracting entropy of manufacturing features, only one bit entropy can be extracted from two ROs, which implies enormous consumption of hardware resources. Motivated by this, we propose an elegant and efficient method to extract at least 31 bits entropy from two ROs by utilizing the fine control of programmable delay lines of look up table (LUT), and denominate this new construction as Further ROPUF. We will elaborate how to take advantage of the underlying manufacturing variations of LUTs and display how deeper variations are extracted by the second order difference calculation method. Additionally, we reveal the consistency between the evaluation results on Xilinx FPGAs and by simulations, and the responds’ low bit-error-rate of 1.85\(\%\) manifests the proposed FROPUF maintains considerable reliability.

L. Zhang—The work is supported by a grant from the National Natural Science Foundation of China (No.61402470).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ruhrmair, U., Holcomb, D.E.: PUFs at a glance. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1–6 (2014)

    Google Scholar 

  2. Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148–160 (2002)

    Google Scholar 

  3. Katzenbeisser, S., Kocabaş, Ü., Rožić, V., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 283–301. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33027-8_17

    Chapter  Google Scholar 

  4. Ravikanth, P., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions, vol. 297. American Association for the Advancement of Science, Washington, DC (2002). pp. 2026–2030

    Google Scholar 

  5. Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 302–319. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33027-8_18

    Chapter  Google Scholar 

  6. Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_5

    Chapter  Google Scholar 

  7. Roy, J.A., Koushanfar, F., Markov, I.L.: EPIC: Ending piracy of integrated circuits. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1069–1074 (2008)

    Google Scholar 

  8. Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wójcik, M.: Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM. In: Chen, L., Yung, M., Zhu, L. (eds.) INTRUST 2011. LNCS, vol. 7222, pp. 271–288. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32298-3_18

    Chapter  Google Scholar 

  9. Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE International Conference on RFID, pp. 58–64 (2008)

    Google Scholar 

  10. Tuyls, P., Škorić, B.: Strong authentication with physical unclonable functions. In: Petković, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 133–148. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Holcomb, D.E., Fu, K.: Bitline PUF: building native challenge-response PUF capability into any SRAM. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 510–526. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44709-3_28

    Google Scholar 

  12. Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G-J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 67–70 (2008)

    Google Scholar 

  13. Suzuki, D., Shimizu, K.: The glitch PUF: a new delay-PUF architecture exploiting glitch shapes. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 366–382. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15031-9_25

    Chapter  Google Scholar 

  14. Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and System Security (WISSec 2008) (2008)

    Google Scholar 

  15. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference, pp. 9–14 (2007)

    Google Scholar 

  16. Maiti, A., Schaumont, P.: Improved ring oscillator PUF: an FPGA-friendly secure primitive. J. Cryptology 2, 375–397 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  17. Gao, M., Lai, K., Qu, G.: A highly flexible ring oscillator PUF. In: Proceedings of the 51st Annual Design Automation Conference on Design Automation Conference. ACM (2014)

    Google Scholar 

  18. Rahman, T., Forte, D., Fahrny, J., Tehranipoor, M.: ARO-PUF: an aging-resistant ring oscillator PUF design. In: Proceedings of the Conference on Design, Automation & Test in Europe (2014)

    Google Scholar 

  19. Cherkaoui, A., Fischer, V., Aubert, A., Fesquet, L.: Comparison of self-timed ring and inverter ring oscillators as entropy sources in FPGAs. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1325–1330. IEEE (2012)

    Google Scholar 

  20. Yin, C-E., Qu, G., Zhou, Q.: Design and implementation of a group-based RO PUF. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 416–421. EDA Consortium (2013)

    Google Scholar 

  21. Dominik, M., Heyszl, J., Heinz, B., Schuster, D., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of RO PUFs. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 19–24. IEEE (2013)

    Google Scholar 

  22. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_31

    Chapter  Google Scholar 

  23. Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181–197. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85053-3_12

    Chapter  Google Scholar 

  24. Habib, B., Kris, G., Kaps, J-P.: FPGA PUF based on programmable LUT delays. In: 2013 Euromicro Conference on Digital System Design (DSD). IEEE (2013)

    Google Scholar 

  25. Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA-based true random number generation using circuit metastability with adaptive feedback control. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 17–32. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_2

    Chapter  Google Scholar 

  26. Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA PUF using programmable delay lines. In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (2010)

    Google Scholar 

  27. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions, pp. 237–249 (2010)

    Google Scholar 

  28. Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 3–37. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  29. Wold, K., Tan, C.H.: Analysis and enhancement of random number generator in FPGA based on oscillator rings. In: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, pp. 385–390. IEEE Computer Society (2008)

    Google Scholar 

  30. Maiti, A., Casarona, J., McHale, L.: A large scale characterization of RO-PUF. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94–99. IEEE (2010)

    Google Scholar 

  31. Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 332–347. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04138-9_24

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingchen Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhang, Q., Liu, Z., Ma, C., Li, C., Zhang, L. (2017). FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59608-2_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59607-5

  • Online ISBN: 978-3-319-59608-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics