Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays

  • Jorge Guajardo
  • Sandeep S. Kumar
  • Klaus Kursawe
  • Geert-Jan Schrijen
  • Pim Tuyls


In today’s globalized economy, it has become standard business practice to include third party Intellectual Property (IP) into products. However, licensing IP to third parties forces IP vendors to ensure that they can generate revenue from their internally developed IP blocks. This is only guaranteed if designs are properly protected against theft, cloning, and grey market overproduction. In this paper, we describe a solution for the IP protection problem on Field Programmable Gate Arrays (FPGAs) based on the use of Physical Unclonable Functions (PUFs). Our solution includes optimizations at the protocol level, making the resulting protocols more efficient than previously proposed ones. In addition, we show how SRAM memory blocks present in current FPGAs can be used as a PUF. This leads to a solution which allows unique identification of FPGAs without requiring significant additional hardware resources, and to ensure code can only run on authorized platforms.


Trusted Third Party Intellectual Property Protection Secrecy Rate SRAM Cell Physical Unclonable Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Brun99]
    Richard Bruner, Catching the Outsourcing Wave — the boom in semiconductor foundries serving fabless semiconductor companies — Industry Trend or Event. Electronic News, April 12, 1999.Google Scholar
  2. [ChRA04]
    B. Cheng, S. Roy, and A. Asenov, “The impact of random doping effects on CMOS SRAM cell,” in European Solid State Circuits Conference. Washington, DC, USA: IEEE Computer Society, 2004, pp. 219–222.CrossRefGoogle Scholar
  3. [DoRS04]
    Y. Dodis, M. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” in Advances in Cryptology — EUROCRYPT 2004, ser. LNCS, C. Cachin and J. Camenisch, Eds., vol. 3027. Springer-Verlag, 2004, pp. 523–540.Google Scholar
  4. [GCDD02a]
    B. Gassend, D. E. Clarke, M. van Dijk, and S. Devadas, “Silicon physical unknown functions,” in A CM Conference on Computer and Communications Security — CCS 2002, V. Atluri, Ed. ACM, November 2002, pp. 148–160.Google Scholar
  5. [GCDD02b]
    B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, “Controlled Physical Random Functions,” in ACSAC’ 02: Proceedings of the 18th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2002, p. 149.CrossRefGoogle Scholar
  6. [GKST07]
    J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “FPGA Intrinsic PUFs and Their Use for IP Protection,” in Cryptographic Hardware and Embedded Systems — CHES 2007, ser. LNCS. Springer, To appear 2007.Google Scholar
  7. [ISS+06]
    T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, and F. Willems. “Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method”. In IEEE International Symposium on Information Theory, pp. 499–503, Seattle, USA, July 2006.Google Scholar
  8. [KeanO2]
    T. Kean, “Cryptographic rights management of FPGA intellectual property cores,” in ACM/SIGDA tenth international symposium on Field-programmable gate arrays — FPGA 2002, ACM, 2002, pp. 113–118.Google Scholar
  9. [KPMG05]
    KPMG Electronics, Software & Services and Alliance for Gray Market and Counterfeit Abatement, “Managing the Risks of Counterfeiting in the Information Technology Industry, White Paper,” 2005.Google Scholar
  10. [LiTuO3]
    J.-P M. G. Linnartz and P. Tuyls, “New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometrie Templates,” in Audio-and Video-Based Biometrie Person Authentication—AVBPA 2003, ser. LNCS, J. Kittler and M. S. Nixon, Eds., vol. 2688. Springer, June 9–11, 2003, pp. 393–402.Google Scholar
  11. [LLG+05]
    D. Lim, J. W Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, pp. 1200–1205, October 2005.CrossRefGoogle Scholar
  12. [PeWe72]
    W. W. Peterson and E. J. Weldon, Jr. Error-Correcting Codes. The MIT Press, second edition, 1972.Google Scholar
  13. [PRTG02]
    R. S. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,” Science, vol. 297, no. 6, pp. 2026–2030, 2002.CrossRefGoogle Scholar
  14. [SiScOö]
    E. Simpson and P. Schaumont, “Offline Hardware/Software Authentication for Reconfigurable Platforms,” in Cryptographic Hardware and Embedded Systems — CHES 2006, ser. LNCS, L. Goubin and M. Matsui, Eds., vol. 4249. Springer, October 10–13, 2006, pp. 311–323.Google Scholar
  15. [SuHO07]
    Y. Su, J. Holleman, and B. Otis, “A 1.6pJ/bit 96% Stable Chip-ID Generating Cicuit using Process Variations,” mISSCC’ 07: IEEE International Solid-State Circuits Conference. Washington, DC, USA: IEEE Computer Society, 2007, pp. 406–408.Google Scholar
  16. [TSS+06]
    P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, and R. Wolters, “Read-Proof Hardware from Protective Coatings,” in Cryptographic Hardware and Embedded Systems — CHES 2006, ser. LNCS, vol. 4249. Springer, October 10–13, 2006, pp. 369–383.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden 2007

Authors and Affiliations

  • Jorge Guajardo
    • 1
  • Sandeep S. Kumar
    • 1
  • Klaus Kursawe
    • 1
  • Geert-Jan Schrijen
    • 1
  • Pim Tuyls
    • 1
  1. 1.Information and System Security GroupPhilips Research EuropeEindhovenNetherlands

Personalised recommendations