Towards Hardware-Intrinsic Security


Ahmad-Reza. Sadeghi
Bok Engelsk 2010 · Electronic books.
Annen tittel
Utgitt
Berlin : Springer , c2010
Omfang
1 online resource (405 p.)
Opplysninger
Description based upon print version of record.. - Information Security and Cryptography; Foreword; Contents; List of Contributors; Part I Physically Unclonable Functions (PUFs); Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions; Roel Maes and Ingrid Verbauwhede; 1 Introduction; 2 PUF Terminology and Measures; 2.1 Challenges and Responses; 2.2 Inter- and Intra-distance Measures; 2.3 Environmental Effects; 3 PUF Instantiations; 3.1 Non-electronic PUFs; 3.2 Analog Electronic PUFs; 3.3 Delay-Based Intrinsic PUFs; 3.4 Memory-Based Intrinsic PUFs; 3.5 PUF Concepts; 4 PUF Properties. - 2.1 Limitations of Current Key Storage Mechanisms2.2 A Radical New Approach to Secure Key Storage; 3 Hardware Intrinsic Security; 3.1 Physically Unclonable Functions; 3.2 Examples of PUFs; 3.3 Secure Key Storage Based on PUFs; 4 Quality of a PUF; 4.1 Reliability; 4.2 Security; 5 Conclusions; References; From Statistics to Circuits: Foundations for Future Physical Unclonable Functions; Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, and Huaiye Zhang; 1 Introduction; 2 Components and Quality Factors of a PUF Design; 2.1 Components of a PUF. - 2.2 PUF Quality Factors2.3 Sources of CMOS Variability and Compensation of Unwanted Variability; 3 Circuit-Level Optimization of PUF; 3.1 Methodology; 3.2 Background: Operating Voltage and Body Bias; 3.3 Effect of Operating Voltage and Body Bias on PUF; 4 Architecture-Level Optimization of PUF; 4.1 Compensation of Environmental Effects; 4.2 Compensation of Correlated Process Variations; 5 Identity Mapping and Testing; 5.1 Statistical Preliminaries; 5.2 A New Test Statistic: Q; 5.3 Experimental Results; 5.4 Compensation of Environmental Effects; 5.5 Open Challenges. - 4.1 Property Description4.2 Property Check; 4.3 Least Common Subset of PUF Properties; 5 PUF Application Scenarios; 5.1 System Identification; 5.2 Secret Key Generation; 5.3 Hardware-Entangled Cryptography; 6 PUF Discussions and Some Open Questions; 6.1 Predictability Versus Implementation Size; 6.2 Formalization of PUF Properties; 6.3 Reporting on PUF Implementation Results; 7 Conclusion; References; Hardware Intrinsic Security from Physically Unclonable Functions; Helena Handschuh, Geert-Jan Schrijen, and Pim Tuyls; 1 Introduction; 2 Rethinking Secure Key Storage Mechanisms. - 5.2 Security of PUF-Based Identification in the Digital Attack Model. - 6 ConclusionsReferences; Strong PUFs: Models, Constructions, and Security Proofs; Ulrich Rührmair, Heike Busch, and Stefan Katzenbeisser; 1 Introduction; 2 Implementations of Strong Physical Unclonable Functions; 3 Physical Unclonable Functions: Toward a Formal Definition; 3.1 Physical One-Way Functions; 3.2 Physical Unclonable Functions; 3.3 Physical Random Functions; 4 Alternative Attack Models; 4.1 Semi-formal Models for Strong PUFs; 4.2 The Digital Attack Model; 5 Identification Schemes Based on Strong PUFs; 5.1 PUF-Based Identification Schemes. - Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security fo
Emner
Sjanger
Dewey
ISBN
9783642144516

Bibliotek som har denne