Protection Profile for PUF-based Devices

Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann

Research output: Chapter in Book/Report/Conference proceedingsConference contribution

3 Citations (Scopus)

Abstract

Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique "fingerprint" of the IC, to enable generation of secrets or keys without storing sensitive data permanently in memory. Since PUFs are "noisy" functions, some kind of post processing is required to reliably reconstruct the respective PUF response. Based on potential threats and vulnerabilities as well as the security requirements for PUF-based tokens we developed a draft version of a Protection Profile according to Common Criteria. This paper discusses the central parts of this Protection Profile, namely the Target of Evaluation (TOE), PUF-specific security functional requirements (SFRs), and requirements on the operational environment regarding the whole life cycle of the TOE.
Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings
EditorsNora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
PublisherSpringer
Pages91-98
Number of pages8
ISBN (Electronic)9783642554148
ISBN (Print)978-3-642-55414-8
DOIs
Publication statusPublished - 2014
EventIFIP SEC 2014 29th International Information Security and Privacy Conference - Marrakech, Morocco
Duration: 2 Jun 20144 Jun 2014
http://www.ensa.ac.ma/sec2014/

Publication series

NameIFIP Advances in Information and Communication Technology
Volume428
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

ConferenceIFIP SEC 2014 29th International Information Security and Privacy Conference
Country/TerritoryMorocco
CityMarrakech
Period02.06.201404.06.2014
Internet address

Keywords

  • Physically Unclonable Function (PUF)
  • Protection Profile

Fingerprint

Dive into the research topics of 'Protection Profile for PUF-based Devices'. Together they form a unique fingerprint.

Cite this