Skip to main content

An Introduction to Security Based on Physical Disorder

  • Chapter
  • First Online:
  • 339 Accesses

Part of the book series: Springer Theses ((Springer Theses))

Abstract

The ever-growing number of connected smart devices, programs and data brings with it a growing demand to ensure the security and reliability of these systems. This problem is now a significant challenge for all of society, as these devices have become completely pervasive in everyday life. Example uses include carrying out financial transactions, communicating with other people, monitoring people’s health and interacting with the environment. As these devices fulfil critical tasks, one of the core requirements that needs to be addressed lies in their secure authentication, identification and integrity checking. This chapter introduces a strategy that has emerged over recent years, which utilises inherent, hard-to-clone randomness of physically disordered systems to define the secure identity of a system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Bibliography

  1. R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (Wiley, New Jersey, 2008)

    Google Scholar 

  2. A. Barenghi et al., Fault injection attacks on cryptographic devices: theory, practise and countermeasures. Proc. IEEE 100, 3056 (2012)

    Article  Google Scholar 

  3. R.W. Hamming, Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147–160 (1950)

    Article  MathSciNet  Google Scholar 

  4. M.D. Yu, S. Devadas, Secure and robust error correction for physical unclonable functions. IEEE Des. Test Comput. 27, 48 (2010)

    Article  Google Scholar 

  5. M. Majzoobi et al., FPGA PUF using programmable delay lines, in IEEE Workshop on Information Forensics and Security (2010), pp. 1–6

    Google Scholar 

  6. G.J. Simmons, A system for verifying user identity and authorization at the point-of sale or access. Cryptologia 8, 1 (1984)

    Article  Google Scholar 

  7. B. Gassend et al., Silicon physical random functions, in Computer and Communication Security Conference (2002)

    Google Scholar 

  8. R. Pappu et al., Physical one-way functions. Science 297, 2026 (2002)

    Article  ADS  Google Scholar 

  9. D. Lim et al., Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13, 1200 (2005)

    Article  Google Scholar 

  10. D.E. Holcomb et al., Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58, 1198 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. C. Helfmeier et al., Cloning physically unclonable functions, in IEEE International Symposium on Hardware-Oriented Security and Trust (2013)

    Google Scholar 

  12. U. Rürrmair et al., Modelling attacks on physical unclonable functions, in Conference on Computer and Communications Security (2010)

    Google Scholar 

  13. D. Merli et al., Side channel analysis of PUFs and fuzzy extractors, in Conference on Trust and Trustworthy Computing (2011)

    Google Scholar 

  14. S. Graybeal, P. McFate, Getting out of the STARTing block. Sci. Am. 261, 6 (1989)

    Article  Google Scholar 

  15. G. Hammouri et al., CDs have fingerprints too, in Cryptographic Hardware and Embedded Systems (2009), pp. 348–362

    Google Scholar 

  16. U. Ruhrmair et al., Method and system for security purposes, European Patent Application, EP09157041.6 (2009)

    Google Scholar 

  17. C. Clelland et al., Hiding messages in DNA microdots. Nature 399, 6736 (1999)

    Article  Google Scholar 

  18. B. Skoric, Quantum readout of physical unclonable functions, in Progress in Cryptology (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonathan Roberts .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Roberts, J. (2017). An Introduction to Security Based on Physical Disorder. In: Using Imperfect Semiconductor Systems for Unique Identification. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-67891-7_1

Download citation

Publish with us

Policies and ethics