Abstract
Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique "fingerprint" of the IC, to enable generation of secrets or keys without storing sensitive data permanently in memory. Since PUFs are "noisy" functions, some kind of post processing is required to reliably reconstruct the respective PUF response. Based on potential threats and vulnerabilities as well as the security requirements for PUF-based tokens we developed a draft version of a Protection Profile according to Common Criteria. This paper discusses the central parts of this Protection Profile, namely the Target of Evaluation (TOE), PUF-specific security functional requirements (SFRs), and requirements on the operational environment regarding the whole life cycle of the TOE.
Original language | English |
---|---|
Title of host publication | ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings |
Editors | Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans |
Publisher | Springer |
Pages | 91-98 |
Number of pages | 8 |
ISBN (Electronic) | 9783642554148 |
ISBN (Print) | 978-3-642-55414-8 |
DOIs | |
Publication status | Published - 2014 |
Event | IFIP SEC 2014 29th International Information Security and Privacy Conference - Marrakech, Morocco Duration: 2 Jun 2014 → 4 Jun 2014 http://www.ensa.ac.ma/sec2014/ |
Publication series
Name | IFIP Advances in Information and Communication Technology |
---|---|
Volume | 428 |
ISSN (Print) | 1868-4238 |
ISSN (Electronic) | 1868-422X |
Conference
Conference | IFIP SEC 2014 29th International Information Security and Privacy Conference |
---|---|
Country/Territory | Morocco |
City | Marrakech |
Period | 02.06.2014 → 04.06.2014 |
Internet address |
Keywords
- Physically Unclonable Function (PUF)
- Protection Profile