Securing Communication Devices via Physical Unclonable Functions (PUFs)

  • Nicolas Sklavos

Abstract

In recent years, it has been more than obvious that electronic hardware devices are more than pervasive parts, in most aspects of everyday life. Although, the increased need for communications and transactions, makes both security and privacy manners a crucial factor, that has to be considered with high attention. New methodologies and approaches are developed, in order the need for high security levels, to be satisfied successfully.

Physical Unclonable Functions (PUFs) have attracted the interest of the research community the last years. PUFs basically support cryptographic primitives, in order to implement security schemes, such as key generation and storage, authentication, as well as identification.

This work carries out operation aspects of PUFs, as well as use cases, which are currently investigated by the researchers. In this paper, design approaches of PUFs are introduced, with detailed aspects of their behaviour. The security properties of the presented designs are given in detail, in order to demonstrate the security properties, introduced by the physical properties, in the most sufficient way. Comparisons of the alternative philosophies of the different designs are given.

Keywords

Entropy 

Notes

Acknowledgement

This work was partially supported by COST Action IC1204: Trustworthy Manufacturing and Utilization Of Secure Devices (TRUDEVICE).

References

  1. [BePo09]
    Beckmann, N., Potkonjak, M.: Hardware-based public-key cryptography with public physically unclonable functions pp. 206-220, 2009.Google Scholar
  2. [MaVe10]
    Maes Roel, Verbauwhede Ingrid, Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions, In Towards Hardware-Intrinsic Security, D. Naccache, and A. Sadeghi (eds.), Springer, 36 pages, 2010.Google Scholar
  3. [Puff13]
    Puffin Project: Physically Unclonable Functions Found in Standard PC Components, “INFSO-ICT-284833”, Web: http://puffin.eu.org/, 2013.
  4. [ScLe13]
    Schaller Andre, Leet van der Vincent, Pkysically Unclonable Functions found in Standard Components of Commercial Devices, First Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Co-located with IEEE European Test Symposium, Avignon, France, May 30-31, 2013.Google Scholar
  5. [SkEf07]
    Sklavos Nicolas, Efstathiou Costas, SecurID Authenticator: On the Hardware Implementation Efficiency, proceedings of 14th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS’07), Morocco, 2007.Google Scholar
  6. [Skla10]
    Sklavos Nicolas, On the Hardware Implementation Cost of Crypto-Processors Architectures, Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 19, Issue: 2, pp. 53-60, 2010.Google Scholar
  7. [SkZh07]
    Sklavos Nicolas, Zhang Xinmiao: Wireless Security and Cryptography: Specifications and Implementations, CRC-Press, A Taylor and Francis Group, ISBN: 084938771X, 2007.Google Scholar
  8. [TGG10]
    TCG, Mobile Trusted Module Specification, Version 1.0, Revision 7.02, Trusted Computing Group, Tech. Rep., 2010.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2013

Authors and Affiliations

  • Nicolas Sklavos
    • 1
  1. 1.KNOSSOSnet Research GroupTechnological Educational Institute of Western GreeceGreece

Personalised recommendations