Skip to main content

Securing Communication Devices via Physical Unclonable Functions (PUFs)

  • Chapter
ISSE 2013 Securing Electronic Business Processes

Abstract

In recent years, it has been more than obvious that electronic hardware devices are more than pervasive parts, in most aspects of everyday life. Although, the increased need for communications and transactions, makes both security and privacy manners a crucial factor, that has to be considered with high attention. New methodologies and approaches are developed, in order the need for high security levels, to be satisfied successfully.

Physical Unclonable Functions (PUFs) have attracted the interest of the research community the last years. PUFs basically support cryptographic primitives, in order to implement security schemes, such as key generation and storage, authentication, as well as identification.

This work carries out operation aspects of PUFs, as well as use cases, which are currently investigated by the researchers. In this paper, design approaches of PUFs are introduced, with detailed aspects of their behaviour. The security properties of the presented designs are given in detail, in order to demonstrate the security properties, introduced by the physical properties, in the most sufficient way. Comparisons of the alternative philosophies of the different designs are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beckmann, N., Potkonjak, M.: Hardware-based public-key cryptography with public physically unclonable functions pp. 206-220, 2009.

    Google Scholar 

  2. Maes Roel, Verbauwhede Ingrid, Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions, In Towards Hardware-Intrinsic Security, D. Naccache, and A. Sadeghi (eds.), Springer, 36 pages, 2010.

    Google Scholar 

  3. Puffin Project: Physically Unclonable Functions Found in Standard PC Components, “INFSO-ICT-284833”, Web: http://puffin.eu.org/, 2013.

  4. Schaller Andre, Leet van der Vincent, Pkysically Unclonable Functions found in Standard Components of Commercial Devices, First Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Co-located with IEEE European Test Symposium, Avignon, France, May 30-31, 2013.

    Google Scholar 

  5. Sklavos Nicolas, Efstathiou Costas, SecurID Authenticator: On the Hardware Implementation Efficiency, proceedings of 14th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS’07), Morocco, 2007.

    Google Scholar 

  6. Sklavos Nicolas, On the Hardware Implementation Cost of Crypto-Processors Architectures, Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 19, Issue: 2, pp. 53-60, 2010.

    Google Scholar 

  7. Sklavos Nicolas, Zhang Xinmiao: Wireless Security and Cryptography: Specifications and Implementations, CRC-Press, A Taylor and Francis Group, ISBN: 084938771X, 2007.

    Google Scholar 

  8. TCG, Mobile Trusted Module Specification, Version 1.0, Revision 7.02, Trusted Computing Group, Tech. Rep., 2010.

    Google Scholar 

Download references

Acknowledgement

This work was partially supported by COST Action IC1204: Trustworthy Manufacturing and Utilization Of Secure Devices (TRUDEVICE).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Sklavos, N. (2013). Securing Communication Devices via Physical Unclonable Functions (PUFs). In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2013 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-03371-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-03371-2_22

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-03370-5

  • Online ISBN: 978-3-658-03371-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics