Physical unclonable functions (PUFs)

Physical unclonable functions (PUFs)

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IP Core Protection and Hardware-Assisted Security for Consumer Electronics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

It has been the practice to store information under lock and key for safeguarding it. Even today, we use cryptographic primitives to store information securely under lock and key, encryption, and decryption. For the process of cryptography, keys are necessary for any operation. But these keys should be stored in the memory so that they can be used whenever necessary. When a key is stored in the memory, it can be stolen by the adversary using various methods. Therefore, storing it in a nonvolatile memory is not an option in this age of security threats. Physical unclonable functions (PUFs) are the promising security primitives used for generating the keys instead of storing them in the memory. These modules use the naturally occurring manufacturing variations in the fabrication process for generating the keys for cryptographic purposes. This chapter discusses different types of PUFs. Section 12.1 gives a brief introduction of PUFs. Section 12.2 discusses working principles of PUFs. Section 12.3 discusses different characteristics of a PUF design. Section 12.4 presents different classifications of PUFs. Various designs of PUF based on ring oscillators (ROs) are presented in Section 12.5, based on multiplexers and reconfigurability are presented in Section 12.6. Static random access memory (SRAM)-based PUFs are presented in Section 12.7, memristor-based PUFs are presented in Section 12.8, and diode-based PUFs are presented in Section 12.9. There are also non-silicon-based PUF designs, such as carbon PUFs, presented in Section 12.10. Microprocessors can also be used for implementing the PUF designs which are presented in Section 12.11. Magnetic material-based PUFs are presented in Section 12.12 and the FPGA implementations of PUF and security measures for FPGA are presented in Section 12.13. Some case study applications are presented in Section 12.14. Further the issues and challenges faced during the design of PUF modules are presented in Section 12.15. The conclusion and future directions are presented in Section 12.16.

Chapter Contents:

  • 12.1 Introduction
  • 12.2 PUF: Principle
  • 12.3 Properties or characteristics of PUFs
  • 12.3.1 Uniqueness
  • 12.3.2 Reliability (correctness)
  • 12.3.3 Randomness (uniformity)
  • 12.3.4 Correlation (bit aliasing)
  • 12.3.5 Power consumption
  • 12.3.6 Speed
  • 12.4 Classification of PUFs
  • 12.4.1 Device-based PUFs
  • Silicon-based PUFs
  • Non-silicon PUFs
  • 12.4.2 Security-based PUFs
  • Strong PUF
  • Weak PUF
  • Controlled PUFs
  • 12.5 Ring oscillator–based PUFs
  • 12.6 Reconfigurable or dynamic PUFs
  • 12.7 SRAM-based PUF
  • 12.8 Memristor-based PUFs
  • 12.9 Diode-based PUF
  • 12.10 Carbon-based PUFs
  • 12.10.1 CNT-based PUF
  • 12.10.2 Graphene-based PUF
  • 12.11 Microprocessor-based PUF
  • 12.12 Magnetic PUF
  • 12.13 Practical implementation of PUF
  • 12.14 PUF: case study applications
  • 12.15 PUF: issues
  • 12.16 Conclusion
  • 12.17 Exercises
  • References

Inspec keywords: microprocessor chips; silicon; elemental semiconductors; cryptography; carbon; logic design; SRAM chips; field programmable gate arrays; memristors; logic gates

Other keywords: manufacturing variations; nonsilicon-based PUF designs; nonvolatile memory; Si; ring oscillators; static random access memory-based PUF; physical unclonable functions; security primitives; fabrication process; diode-based PUF; C; PUF modules; magnetic material-based PUF; cryptographic primitives; FPGA implementations; carbon PUF; security measures; memristor-based PUF; microprocessors

Subjects: Cryptography; Logic circuits; Microprocessors and microcomputers; Digital circuit design, modelling and testing; Semiconductor storage; Logic design methods; Memory circuits; Microprocessor chips; Logic and switching circuits

Preview this chapter:
Zoom in

Physical unclonable functions (PUFs), Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch12-1.gif /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch12-2.gif

Related content

This is a required field
Please enter a valid email address