Global Information Lookup Global Information

Physical unclonable function information


PUFs act as digital uniquely identifying fingerprints[1]

A physical unclonable function (sometimes also called physically-unclonable function, which refers to a weaker security metric than a physical unclonable function [citation needed]), or PUF, is a physical object which operation cannot be reproduced ("cloned") in physical way (by making another system using the same technology), that for a given input and conditions (challenge), provides a physically defined "digital fingerprint" output (response). that serves as a unique identifier, most often for a semiconductor device such as a microprocessor. PUFs are often based on unique physical variations occurring naturally during semiconductor manufacturing.[2] A PUF is a physical entity embodied in a physical structure. PUFs are implemented in integrated circuits, including FPGAs,[3] and can be used in applications with high-security requirements, more specifically cryptography, Internet of Things (IOT) devices [4] and privacy protection.[5]

  1. ^ Maes, Roel (2013), "Physically Unclonable Functions: Properties", Physically Unclonable Functions, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 49–80, doi:10.1007/978-3-642-41395-7_3, ISBN 978-3-642-41394-0, retrieved 2023-04-07
  2. ^ Kamal, Kamal Y.; Muresan, Radu (2019). "Mixed-Signal Physically Unclonable Function With CMOS Capacitive Cells". IEEE Access. 7: 130977–130998. Bibcode:2019IEEEA...7m0977K. doi:10.1109/ACCESS.2019.2938729. hdl:10214/17525. ISSN 2169-3536. S2CID 202766809.
  3. ^ Nozaki, Yusuke; Yoshikawa, Masaya (May 2019). "Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack". 2019 Cybersecurity and Cyberforensics Conference (CCC). Melbourne, Australia: IEEE. pp. 30–34. doi:10.1109/CCC.2019.00-13. ISBN 978-1-7281-2600-5. S2CID 203655491.
  4. ^ Josiah, J. G. (2020). The CCAP: A New Physical Unclonable Function (PUF) for Protecting Internet of Things (IoT) and Other FPGA-based Embedded Systems. ProQuest (Ph.D). ProQuest 2406630562.
  5. ^ Lipps, Christoph; Mallikarjun, Sachinkumar Bavikatti; Strufe, Matthias; Heinz, Christopher; Grimm, Christoph; Schotten, Hans Dieter (June 2020). "Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles". 2020 3rd International Conference on Data Intelligence and Security (ICDIS). IEEE. pp. 93–100. doi:10.1109/icdis50059.2020.00019. ISBN 978-1-7281-9379-3. S2CID 231683963.

and 18 Related for: Physical unclonable function information

Request time (Page generated in 0.7904 seconds.)

Physical unclonable function

Last Update:

A physical unclonable function (sometimes also called physically-unclonable function, which refers to a weaker security metric than a physical unclonable...

Word Count : 4112

Types of physical unclonable function

Last Update:

Physical unclonable function (PUF), sometimes also called physically unclonable function, is a physical entity that is embodied in a physical structure...

Word Count : 5796

Hardware security

Last Update:

context of integrated circuit. A physical unclonable function (PUF) is a physical entity that is embodied in a physical structure and is easy to evaluate...

Word Count : 616

Commitment scheme

Last Update:

information cannot travel faster than light. Physical unclonable functions (PUFs) rely on the use of a physical key with internal randomness, which is hard...

Word Count : 7699

Copy detection pattern

Last Update:

revealed. CDPs have also been described as a type of optical physical unclonable function. While they have been cited as a "powerful tool to detect copies"...

Word Count : 1720

Hardware Trojan

Last Update:

in the Trojan itself and reduction, a physical unclonable function can be used. Physical unclonable functions are small in size and can have an identical...

Word Count : 2440

Index of cryptography articles

Last Update:

• Phelix • Phil Zimmermann • Photuris (protocol) • Physical security • Physical unclonable function • Pig Latin • Pigpen cipher • Pike (cipher) • Piling-up...

Word Count : 2943

Password manager

Last Update:

Robert; Duan, Nan (2021). "Resilient Password Manager Using Physical Unclonable Functions". IEEE Access. 9: 17060–17070. doi:10.1109/ACCESS.2021.3053307...

Word Count : 1630

Quantum cryptography

Last Update:

commitment scheme in which the "unconditional hiding" is perfect. Physical unclonable functions can be also exploited for the construction of cryptographic...

Word Count : 8931

Quantum readout

Last Update:

hands-on scenario, physical unclonable functions (PUFs) of various types can serve as great authentication tokens. Their physical unclonability, combined with...

Word Count : 1431

International Association for Cryptologic Research

Last Update:

algorithms. Related topics such as random number generators, physical unclonable function or special-purpose cryptanalytical machines are also commonly...

Word Count : 1420

Counterfeit

Last Update:

forgeries Prescription Drug Marketing Act Slug Watered stock "Physical Unclonable Functions in Theory and Practice", p. 46, by Christoph Böhm, Maximilian...

Word Count : 2888

Srini Devadas

Last Update:

tracking. Among his research contributions is the invention of Physical Unclonable Functions (PUFs), an important tool for device authentication and key...

Word Count : 287

PUFS

Last Update:

Foreign Studies, in Pyongyang, North Korea Peer Union File System Physical Unclonable Functions Pinups for Soldiers, Georgia, United States This disambiguation...

Word Count : 66

Drones in wildfire management

Last Update:

Alireza (20 January 2019). "Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management". arXiv:1901.06733 [cs.CR]. Mousavi...

Word Count : 4517

PCB reverse engineering

Last Update:

processing is one way to help deter theft. Another is using Physical Unclonable Functions (PUFs) as a digital fingerprint on your PCB that is impossible...

Word Count : 2207

Computer security

Last Update:

desktop computers by utilizing direct memory access protections. Physical Unclonable Functions (PUFs) can be used as a digital fingerprint or a unique identifier...

Word Count : 22144

Trusted execution environment

Last Update:

extracted from one chip cannot be used by others (for example physically unclonable functions). Though deprivation of ownership is not an inherent property of...

Word Count : 3212

PDF Search Engine © AllGlobal.net