Abstract
Physically unclonable functions (PUFs) are an emerging technology that have been proposed as central building blocks in a variety of cryptographic application areas. Keys are not stored permanently anymore, but generated as needed using unique "fingerprints" that are inherent in each device. Since PUFs are "noisy" functions responses generated by a certain PUF instantiation are error-prone and therefore highly sophisticated error correction is required to reliably reconstruct the respective PUF response. To be aware of potential threats and vulnerabilities concerning PUF-based security schemes a risk analysis on different use cases was performed in order to gain requirements for the development and implementation of effective error correction methods as well as requirements regarding the whole operational life cycle of such tokens.
Original language | English |
---|---|
Title of host publication | Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings |
Publisher | Springer |
Pages | 136-139 |
Number of pages | 4 |
ISBN (Print) | 978-3-662-44884-7 |
DOIs | |
Publication status | Published - 2014 |
Event | 15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014 - Aveiro, Portugal Duration: 25 Sept 2014 → 26 Sept 2014 http://cms2014.web.ua.pt/ |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 8735 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014 |
---|---|
Country/Territory | Portugal |
City | Aveiro |
Period | 25.09.2014 → 26.09.2014 |
Internet address |
Keywords
- Physically Unclonable Functions
- Riskanalysis
- Fuzzy Extractor
- Authentication
- Risk Analysis
- Error Correction
- Physically Unclonable Function (PUF)
- Key Generation
- HW/SW Binding
- Cryptographic Applications
- Vulnerabilities and Threats