Home // International Journal On Advances in Security, volume 9, numbers 1 and 2, 2016 // View article


New Applications of Physical Unclonable Functions

Authors:
Rainer Falk
Steffen Fries

Keywords: physical unclonable function; key extraction; embedded security; licensing; configuration integrity

Abstract:
Physical Unclonable Functions (PUF) realize the functionality of a “fingerprint” of a digital circuit. They can be used to authenticate devices without requiring a cryptographic authentication algorithm, or to determine a unique cryptographic key based on hardware-intrinsic, device-specific properties. It is also known to design PUF-based cryptographic protocols. This paper presents several new applications of PUFs. They can be used to check the integrity, or authenticity of presented data. A PUF can be used to build a digital tamper sensor or a digital degradation sensor. An identifying information in a communication protocol can be determined using a PUF, or a licensing mechanism can be realized. The bootstrapping of cryptographic credentials can be protected by a PUF.

Pages: 49 to 58

Copyright: Copyright (c) to authors, 2016. Used with permission.

Publication date: June 30, 2016

Published in: journal

ISSN: 1942-2636