Home // International Journal On Advances in Security, volume 9, numbers 1 and 2, 2016 // View article
New Applications of Physical Unclonable Functions
Authors:
Rainer Falk
Steffen Fries
Keywords: physical unclonable function; key extraction; embedded security; licensing; configuration integrity
Abstract:
Physical Unclonable Functions (PUF) realize the functionality of a “fingerprint” of a digital circuit. They can be used to authenticate devices without requiring a cryptographic authentication algorithm, or to determine a unique cryptographic key based on hardware-intrinsic, device-specific properties. It is also known to design PUF-based cryptographic protocols. This paper presents several new applications of PUFs. They can be used to check the integrity, or authenticity of presented data. A PUF can be used to build a digital tamper sensor or a digital degradation sensor. An identifying information in a communication protocol can be determined using a PUF, or a licensing mechanism can be realized. The bootstrapping of cryptographic credentials can be protected by a PUF.
Pages: 49 to 58
Copyright: Copyright (c) to authors, 2016. Used with permission.
Publication date: June 30, 2016
Published in: journal
ISSN: 1942-2636