Table of Contents Author Guidelines Submit a Manuscript
International Journal of Reconfigurable Computing
Volume 2012, Article ID 168961, 13 pages
http://dx.doi.org/10.1155/2012/168961
Research Article

Implementation of Ring-Oscillators-Based Physical Unclonable Functions with Independent Bits in the Response

Laboratoire Hubert Curien, CNRS, UMR5516, Université de Lyon, 42000 Saint-Etienne, France

Received 1 May 2011; Revised 21 September 2011; Accepted 14 January 2012

Academic Editor: Kris Gaj

Copyright © 2012 Florent Bernard et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Drimer, “Volatile FPGA design security–a survey,” in IEEE Computer Society Annual Volume, pp. 292–297, 2008.
  2. R. Anderson and M. Kuhn, “Low cost attacks on tamper resistant devices,” in Security Protocols, pp. 125–136, Springer, 1998. View at Google Scholar
  3. R. Anderson and M. Kuhn, “Tamper resistance: a cautionary note,” in 2nd USENIX Workshop on Electronic Commerce, vol. 2, 1996.
  4. S.P. Skorobogatov, “Semi-invasive attacks-a new approach to hardware security analysis,” Tech. Rep., University of Cambridge, Computer Laboratory, 2005. View at Google Scholar
  5. J. A. Halderman, S. D. Schoen, N. Heninger et al., “Lest we remember: cold boot attacks on encryption keys,” in USENIX Security Symposium, P.C. van Oorschot, Ed., pp. 45–60, 2008.
  6. R. Pappu, Physical one-way functions, Ph.D. thesis, Massachusetts Institute of Technology, 2001.
  7. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,” Science, vol. 297, no. 5589, pp. 2026–2030, 2002. View at Publisher · View at Google Scholar · View at Scopus
  8. G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication and secret key generation,” in 44th ACM/IEEE Design Automation Conference (DAC '07), pp. 9–14, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Guajardo, S. Kumar, G.J. Schrijen, and P. Tuyls, “FPGA intrinsic PUFs and their use for IP protection,” in Cryptographic Hardware and Embedded Systems (CHES '07), pp. 63–80, 2007.
  10. S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, and P. Tuyls, “Extended abstract: the butterfly PUF protecting IP on every FPGA,” in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST '08), pp. 67–70, 2008.
  11. B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148–160, November 2002. View at Scopus
  12. D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. Van Dijk, and S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Transactions on Very Large Scale Integration, vol. 13, no. 10, pp. 1200–1205, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Maiti and P. Schaumont, “Improved ring oscillator PUF: an FPGA-friendly secure primitive,” Journal of Cryptology, pp. 1–23, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Hori, T. Yoshida, T. Katashita, and A. Satoh, “Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs,” in International Conference on Reconfigurable Computing and FPGAs, pp. 298–303, 2010.
  15. C. Costea, F. Bernard, V. Fischer, and R. Fouquet, “Analysis and enhancement of ring oscillators based physical unclonable functions in FPGAs,” in International Conference on Reconfigurable Computing and FPGAs, pp. 262–267, 2010.
  16. P. Barreto and V. Rijmen, “The Whirlpool hashing function,” in 1st Open NESSIE Workshop, vol. 13, p. 14, Leuven, Belgium, 2000.
  17. P. Sedcole and P. Y. K. Cheung, “Within-die delay variability in 90nm FPGAs and beyond,” in IEEE International Conference on Field Programmable Technology (FPT '06), pp. 97–104, December 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. V. Fischer, F. Bernard, N. Bochard, and M. Varchola, “Enhancing security of ring oscillator-based RNG implemented in FPGA,” in Proceedings of the Field- Programable Logic and Applications (FPL '08), pp. 245–250, September 2008.