SlideShare a Scribd company logo
1 of 21
 What is PUF
 History of PUF
 Why we use PUF
 Conclusion
 References
Why we use PUF?
PUF can also be use for key generation and
storage this is much more secure than
showing key memory because key in the
memory is vulnerable for physical attack and
other attack but if we use PUF to generate a
key, and PUF generate random output for the
same input
Challenges=>Conventional
Authentication
 Conventional Authentication Schemes
 Need to store keys
 Power and area consuming
Challenges => Store Secrets
 Conventional approach to embed secure secrets in IC
• Non-volatile memory(ROM, Fuse, Flash or EEPROM)
• Battery-backed RAM
 Non-volatile memory technologies are often vulnerable to invasive
and non-invasive attack
 Adversaries can physically extract secret keys from EEPROM while
processor is off
Challenges=>expensive tamper proof
packs
 Storing digital information in a device in a way that is
resistant to physical attacks is difficult and expensive.
IBM 4758
● Tamper-proof package containing a
secure processor which has a secret
key and memory
● Tens of sensors, resistance,
temperature, voltage, etc.
● Continually battery-powered
● ~ $3500 for a 99 MHz processor and
128MB of memory
Challenges=>Power and Area
 Power and Area are critical
RFID tag can afford a maximum of 2000 gates for
security features
 Passive RFIDs
 A good cryptographic primitive should be
lightweight, occupy little area on silicon and
should have very low power consumption.
What is PUF
 PUF stands for the Physical Unclonable
Function.
 A Physical Unclonable Function, or PUF, is a
"digital fingerprint" that serves as a unique
identity for a semiconductor device such as a
microprocessor.
 PUFs are based on physical variations which occur
naturally during semiconductor manufacturing,
and which make it possible to differentiate
between otherwise identical semiconductors.
 PUFs are usually utilized in cryptography.
 A physical unclonable function (sometimes
also called physically unclonable function) is a
physical entity that is embodied in a physical
structure.
 Today, PUFs are usually implemented
in integrated circuits and are typically used in
applications with high security requirements.
 PUFs depend on the uniqueness of their
physical microstructure. This microstructure
depends on random physical factors
introduced during manufacturing.
 These factors are unpredictable and
uncontrollable, which makes it virtually
impossible to duplicate or clone the structure.
• PUF is based on physical system
• Behaving like random function(that is
generating random output values)
• Unpredictable even for an attacker with
physical access to the system
• Uncloneable or irreproducible o9n other copy
• Of the some physical system even when the
functionality is known.
Types of PUFs
o Optical PUFs
o Coating and Acoustic PUFs
o Silicon PUFs(SPUF)
o timing and delay information
o easy integrate into ICs
Applications of PUF
1) Low cost authentication[1]
Applications of PUF
2) Cryptographic Key Generator[1]
Applications of PUF
3) Software Licensing and Anonymous Computation[3]
Applications of PUF
3) Software Licensing and Anonymous Computation
Applications of PUF
• 4) Random Number Generation [2]
0.1% of all challenges do not return a
consistent response
These meta-stable challenges
generate responses which can vary
unpredictably
● Strong PUFs
○ Large number of challenge response pairs
○ IC identification and secret key generation
○ E.g arbiter PUF and feed forward arbiter
● Weak PUFs
○ Limited number of challenge response pairs
(sometime just single)
○ Secret key generation
○ E.g SRAM PUF and butterfly PUF
Classification of PUFs
Using a PUF as an Unclonable Key
• A Silicon PUF can be used as an unclonable key.
• The lock has a database of challenge-response pairs.
• To open the lock, the key has to show that it knows the response to one or
more challenges.
?
Private/Public Keys
If a remote chip stores a private key, Alice can share a secret
with the chip since she knows the public key corresponding
to the stored private key
Encrypt Secret using chip’s public key
Only the chip can decrypt Secret using the stored private key
Private Key
Decrypt Secret
Chip
EPublic Key(Secret)
Applications
• Anonymous Computation
Alice wants to run computations on Bob’s
computer, and wants to make sure that she
is getting correct results. A certificate is
returned with her results to show that they
were correctly executed.
• Software Licensing
Alice wants to sell Bob a program which will
only run on Bob’s chip (identified by a PUF).
The program is copy-protected so it will not
run on any other chip.
How can we enable the above applications by trusting only a
single-chip processor that contains a silicon PUF?

More Related Content

What's hot (20)

USB protocol
USB protocolUSB protocol
USB protocol
 
Arm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furberArm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furber
 
Arm instruction set
Arm instruction setArm instruction set
Arm instruction set
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
 
I2C Protocol
I2C ProtocolI2C Protocol
I2C Protocol
 
USART
USARTUSART
USART
 
SPI Bus Protocol
SPI Bus ProtocolSPI Bus Protocol
SPI Bus Protocol
 
ASIC vs SOC vs FPGA
ASIC  vs SOC  vs FPGAASIC  vs SOC  vs FPGA
ASIC vs SOC vs FPGA
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
 
SOC design
SOC design SOC design
SOC design
 
Usb protocol
Usb protocol Usb protocol
Usb protocol
 
Soc architecture and design
Soc architecture and designSoc architecture and design
Soc architecture and design
 
Non ideal effects of pll
Non ideal effects of pllNon ideal effects of pll
Non ideal effects of pll
 
N well
N wellN well
N well
 
UART
UARTUART
UART
 
I2C Protocol
I2C ProtocolI2C Protocol
I2C Protocol
 
Embedded System Networking
Embedded System NetworkingEmbedded System Networking
Embedded System Networking
 
TMS320C5x
TMS320C5xTMS320C5x
TMS320C5x
 
Lect 2 ARM processor architecture
Lect 2 ARM processor architectureLect 2 ARM processor architecture
Lect 2 ARM processor architecture
 
Communication Interface of The Embedded Systems
Communication Interface of The Embedded Systems Communication Interface of The Embedded Systems
Communication Interface of The Embedded Systems
 

Similar to Puf

Firmware Extraction & Fuzzing - Jatan Raval
Firmware Extraction & Fuzzing - Jatan RavalFirmware Extraction & Fuzzing - Jatan Raval
Firmware Extraction & Fuzzing - Jatan RavalNSConclave
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
 
Embedded_System_wireless_Technolgy_with_Microcontrollers
Embedded_System_wireless_Technolgy_with_MicrocontrollersEmbedded_System_wireless_Technolgy_with_Microcontrollers
Embedded_System_wireless_Technolgy_with_Microcontrollersdundappabhangari
 
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]RootedCON
 
HKUST Security Lab Opening Ceremony
HKUST Security Lab Opening CeremonyHKUST Security Lab Opening Ceremony
HKUST Security Lab Opening CeremonyKelvin Chan
 
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptx
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptxFANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptx
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptxPannaBushratul
 
Operating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputOperating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputPeter Tröger
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentationCHIACHE lee
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...CODE BLUE
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architectureKumar
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architectureKumar
 

Similar to Puf (20)

Firmware Extraction & Fuzzing - Jatan Raval
Firmware Extraction & Fuzzing - Jatan RavalFirmware Extraction & Fuzzing - Jatan Raval
Firmware Extraction & Fuzzing - Jatan Raval
 
lb.pptx
lb.pptxlb.pptx
lb.pptx
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
 
Embedded_System_wireless_Technolgy_with_Microcontrollers
Embedded_System_wireless_Technolgy_with_MicrocontrollersEmbedded_System_wireless_Technolgy_with_Microcontrollers
Embedded_System_wireless_Technolgy_with_Microcontrollers
 
Microcontroller
Microcontroller Microcontroller
Microcontroller
 
Os introduction
Os introductionOs introduction
Os introduction
 
Os introduction
Os introductionOs introduction
Os introduction
 
PUF_lecture1.pdf
PUF_lecture1.pdfPUF_lecture1.pdf
PUF_lecture1.pdf
 
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
Eloi Sanfélix y Javier Moreno - Hardware hacking on your couch [RootedCON 2012]
 
HKUST Security Lab Opening Ceremony
HKUST Security Lab Opening CeremonyHKUST Security Lab Opening Ceremony
HKUST Security Lab Opening Ceremony
 
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptx
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptxFANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptx
FANDAMENTAL OF COMPUTER SCIENCE FOR ENGINEERING.pptx
 
Operating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / OutputOperating Systems 1 (11/12) - Input / Output
Operating Systems 1 (11/12) - Input / Output
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
Memory interfacing
Memory interfacingMemory interfacing
Memory interfacing
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Puf

  • 1.
  • 2.  What is PUF  History of PUF  Why we use PUF  Conclusion  References
  • 3. Why we use PUF? PUF can also be use for key generation and storage this is much more secure than showing key memory because key in the memory is vulnerable for physical attack and other attack but if we use PUF to generate a key, and PUF generate random output for the same input
  • 4. Challenges=>Conventional Authentication  Conventional Authentication Schemes  Need to store keys  Power and area consuming
  • 5. Challenges => Store Secrets  Conventional approach to embed secure secrets in IC • Non-volatile memory(ROM, Fuse, Flash or EEPROM) • Battery-backed RAM  Non-volatile memory technologies are often vulnerable to invasive and non-invasive attack  Adversaries can physically extract secret keys from EEPROM while processor is off
  • 6. Challenges=>expensive tamper proof packs  Storing digital information in a device in a way that is resistant to physical attacks is difficult and expensive. IBM 4758 ● Tamper-proof package containing a secure processor which has a secret key and memory ● Tens of sensors, resistance, temperature, voltage, etc. ● Continually battery-powered ● ~ $3500 for a 99 MHz processor and 128MB of memory
  • 7. Challenges=>Power and Area  Power and Area are critical RFID tag can afford a maximum of 2000 gates for security features  Passive RFIDs  A good cryptographic primitive should be lightweight, occupy little area on silicon and should have very low power consumption.
  • 8. What is PUF  PUF stands for the Physical Unclonable Function.  A Physical Unclonable Function, or PUF, is a "digital fingerprint" that serves as a unique identity for a semiconductor device such as a microprocessor.  PUFs are based on physical variations which occur naturally during semiconductor manufacturing, and which make it possible to differentiate between otherwise identical semiconductors.
  • 9.  PUFs are usually utilized in cryptography.  A physical unclonable function (sometimes also called physically unclonable function) is a physical entity that is embodied in a physical structure.  Today, PUFs are usually implemented in integrated circuits and are typically used in applications with high security requirements.
  • 10.  PUFs depend on the uniqueness of their physical microstructure. This microstructure depends on random physical factors introduced during manufacturing.  These factors are unpredictable and uncontrollable, which makes it virtually impossible to duplicate or clone the structure.
  • 11. • PUF is based on physical system • Behaving like random function(that is generating random output values) • Unpredictable even for an attacker with physical access to the system • Uncloneable or irreproducible o9n other copy • Of the some physical system even when the functionality is known.
  • 12. Types of PUFs o Optical PUFs o Coating and Acoustic PUFs o Silicon PUFs(SPUF) o timing and delay information o easy integrate into ICs
  • 13. Applications of PUF 1) Low cost authentication[1]
  • 14. Applications of PUF 2) Cryptographic Key Generator[1]
  • 15. Applications of PUF 3) Software Licensing and Anonymous Computation[3]
  • 16. Applications of PUF 3) Software Licensing and Anonymous Computation
  • 17. Applications of PUF • 4) Random Number Generation [2] 0.1% of all challenges do not return a consistent response These meta-stable challenges generate responses which can vary unpredictably
  • 18. ● Strong PUFs ○ Large number of challenge response pairs ○ IC identification and secret key generation ○ E.g arbiter PUF and feed forward arbiter ● Weak PUFs ○ Limited number of challenge response pairs (sometime just single) ○ Secret key generation ○ E.g SRAM PUF and butterfly PUF Classification of PUFs
  • 19. Using a PUF as an Unclonable Key • A Silicon PUF can be used as an unclonable key. • The lock has a database of challenge-response pairs. • To open the lock, the key has to show that it knows the response to one or more challenges. ?
  • 20. Private/Public Keys If a remote chip stores a private key, Alice can share a secret with the chip since she knows the public key corresponding to the stored private key Encrypt Secret using chip’s public key Only the chip can decrypt Secret using the stored private key Private Key Decrypt Secret Chip EPublic Key(Secret)
  • 21. Applications • Anonymous Computation Alice wants to run computations on Bob’s computer, and wants to make sure that she is getting correct results. A certificate is returned with her results to show that they were correctly executed. • Software Licensing Alice wants to sell Bob a program which will only run on Bob’s chip (identified by a PUF). The program is copy-protected so it will not run on any other chip. How can we enable the above applications by trusting only a single-chip processor that contains a silicon PUF?