Abstract
The ever-growing number of connected smart devices, programs and data brings with it a growing demand to ensure the security and reliability of these systems. This problem is now a significant challenge for all of society, as these devices have become completely pervasive in everyday life. Example uses include carrying out financial transactions, communicating with other people, monitoring people’s health and interacting with the environment. As these devices fulfil critical tasks, one of the core requirements that needs to be addressed lies in their secure authentication, identification and integrity checking. This chapter introduces a strategy that has emerged over recent years, which utilises inherent, hard-to-clone randomness of physically disordered systems to define the secure identity of a system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsBibliography
R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (Wiley, New Jersey, 2008)
A. Barenghi et al., Fault injection attacks on cryptographic devices: theory, practise and countermeasures. Proc. IEEE 100, 3056 (2012)
R.W. Hamming, Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147–160 (1950)
M.D. Yu, S. Devadas, Secure and robust error correction for physical unclonable functions. IEEE Des. Test Comput. 27, 48 (2010)
M. Majzoobi et al., FPGA PUF using programmable delay lines, in IEEE Workshop on Information Forensics and Security (2010), pp. 1–6
G.J. Simmons, A system for verifying user identity and authorization at the point-of sale or access. Cryptologia 8, 1 (1984)
B. Gassend et al., Silicon physical random functions, in Computer and Communication Security Conference (2002)
R. Pappu et al., Physical one-way functions. Science 297, 2026 (2002)
D. Lim et al., Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13, 1200 (2005)
D.E. Holcomb et al., Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58, 1198 (2009)
C. Helfmeier et al., Cloning physically unclonable functions, in IEEE International Symposium on Hardware-Oriented Security and Trust (2013)
U. Rürrmair et al., Modelling attacks on physical unclonable functions, in Conference on Computer and Communications Security (2010)
D. Merli et al., Side channel analysis of PUFs and fuzzy extractors, in Conference on Trust and Trustworthy Computing (2011)
S. Graybeal, P. McFate, Getting out of the STARTing block. Sci. Am. 261, 6 (1989)
G. Hammouri et al., CDs have fingerprints too, in Cryptographic Hardware and Embedded Systems (2009), pp. 348–362
U. Ruhrmair et al., Method and system for security purposes, European Patent Application, EP09157041.6 (2009)
C. Clelland et al., Hiding messages in DNA microdots. Nature 399, 6736 (1999)
B. Skoric, Quantum readout of physical unclonable functions, in Progress in Cryptology (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Roberts, J. (2017). An Introduction to Security Based on Physical Disorder. In: Using Imperfect Semiconductor Systems for Unique Identification. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-67891-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-67891-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67890-0
Online ISBN: 978-3-319-67891-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)