Custom cover image
Custom cover image

Towards Hardware-Intrinsic Security : Foundations and Practice / edited by Ahmad-Reza Sadeghi, David Naccache

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Information Security and Cryptography | SpringerLink BücherPublisher: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2010Description: Online-Ressource (CCCXC, 390p. 106 illus, digital)ISBN:
  • 9783642144523
Subject(s): Genre/Form: Additional physical formats: 9783642144516 | Buchausg. u.d.T.: Towards hardware-intrinsic security. Berlin : Springer, 2010. XVI, 407 S.DDC classification:
  • 005.74
  • 005.82 22/ger
MSC: MSC: *68M99 | 68-06 | 68P25 | 68N99 | 00B15LOC classification:
  • QA76.9.D35
  • TK7887.5
DOI: DOI: 10.1007/978-3-642-14452-3Online resources:
Contents:
Information Security and Cryptography; Foreword; Contents; List of Contributors; Part I Physically Unclonable Functions (PUFs); Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions; Roel Maes and Ingrid Verbauwhede; 1 Introduction; 2 PUF Terminology and Measures; 2.1 Challenges and Responses; 2.2 Inter- and Intra-distance Measures; 2.3 Environmental Effects; 3 PUF Instantiations; 3.1 Non-electronic PUFs; 3.2 Analog Electronic PUFs; 3.3 Delay-Based Intrinsic PUFs; 3.4 Memory-Based Intrinsic PUFs; 3.5 PUF Concepts; 4 PUF Properties
4.1 Property Description4.2 Property Check; 4.3 Least Common Subset of PUF Properties; 5 PUF Application Scenarios; 5.1 System Identification; 5.2 Secret Key Generation; 5.3 Hardware-Entangled Cryptography; 6 PUF Discussions and Some Open Questions; 6.1 Predictability Versus Implementation Size; 6.2 Formalization of PUF Properties; 6.3 Reporting on PUF Implementation Results; 7 Conclusion; References; Hardware Intrinsic Security from Physically Unclonable Functions; Helena Handschuh, Geert-Jan Schrijen, and Pim Tuyls; 1 Introduction; 2 Rethinking Secure Key Storage Mechanisms
2.1 Limitations of Current Key Storage Mechanisms2.2 A Radical New Approach to Secure Key Storage; 3 Hardware Intrinsic Security; 3.1 Physically Unclonable Functions; 3.2 Examples of PUFs; 3.3 Secure Key Storage Based on PUFs; 4 Quality of a PUF; 4.1 Reliability; 4.2 Security; 5 Conclusions; References; From Statistics to Circuits: Foundations for Future Physical Unclonable Functions; Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, and Huaiye Zhang; 1 Introduction; 2 Components and Quality Factors of a PUF Design; 2.1 Components of a PUF
2.2 PUF Quality Factors2.3 Sources of CMOS Variability and Compensation of Unwanted Variability; 3 Circuit-Level Optimization of PUF; 3.1 Methodology; 3.2 Background: Operating Voltage and Body Bias; 3.3 Effect of Operating Voltage and Body Bias on PUF; 4 Architecture-Level Optimization of PUF; 4.1 Compensation of Environmental Effects; 4.2 Compensation of Correlated Process Variations; 5 Identity Mapping and Testing; 5.1 Statistical Preliminaries; 5.2 A New Test Statistic: Q; 5.3 Experimental Results; 5.4 Compensation of Environmental Effects; 5.5 Open Challenges
6 ConclusionsReferences; Strong PUFs: Models, Constructions, and Security Proofs; Ulrich Rührmair, Heike Busch, and Stefan Katzenbeisser; 1 Introduction; 2 Implementations of Strong Physical Unclonable Functions; 3 Physical Unclonable Functions: Toward a Formal Definition; 3.1 Physical One-Way Functions; 3.2 Physical Unclonable Functions; 3.3 Physical Random Functions; 4 Alternative Attack Models; 4.1 Semi-formal Models for Strong PUFs; 4.2 The Digital Attack Model; 5 Identification Schemes Based on Strong PUFs; 5.1 PUF-Based Identification Schemes
5.2 Security of PUF-Based Identification in the Digital Attack Model
Summary: Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.PPN: PPN: 165060551XPackage identifier: Produktsigel: ZDB-2-SCS
No physical items for this record