Riskanalysis of Physically Unclonable Functions

Andrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann

Research output: Chapter in Book/Report/Conference proceedingsConference contribution

Abstract

Physically unclonable functions (PUFs) are an emerging technology that have been proposed as central building blocks in a variety of cryptographic application areas. Keys are not stored permanently anymore, but generated as needed using unique "fingerprints" that are inherent in each device. Since PUFs are "noisy" functions responses generated by a certain PUF instantiation are error-prone and therefore highly sophisticated error correction is required to reliably reconstruct the respective PUF response. To be aware of potential threats and vulnerabilities concerning PUF-based security schemes a risk analysis on different use cases was performed in order to gain requirements for the development and implementation of effective error correction methods as well as requirements regarding the whole operational life cycle of such tokens.
Original languageEnglish
Title of host publicationCommunications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings
PublisherLecture Notes in Computer Science by Springer
Pages136-139
Number of pages4
ISBN (Print)978-3-662-44884-7
DOIs
Publication statusPublished - 2014
Event15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014 - Aveiro, Portugal
Duration: 25 Sep 201426 Sep 2014
http://cms2014.web.ua.pt/

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8735 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014
CountryPortugal
CityAveiro
Period25.09.201426.09.2014
Internet address

Keywords

  • Physically Unclonable Functions
  • Riskanalysis
  • Fuzzy Extractor
  • Authentication
  • Risk Analysis
  • Error Correction
  • Physically Unclonable Function (PUF)
  • Key Generation
  • HW/SW Binding
  • Cryptographic Applications
  • Vulnerabilities and Threats

Fingerprint Dive into the research topics of 'Riskanalysis of Physically Unclonable Functions'. Together they form a unique fingerprint.

Cite this