2004
DOI: 10.1002/cpe.805
|View full text |Cite
|
Sign up to set email alerts
|

Identification and authentication of integrated circuits

Abstract: SUMMARYThis paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise measurement of circuit delays and a simple challenge-response protocol. This technique could be used to produce key-cards that are more difficult to clone than ones involving digital keys on the IC. We consider potential venues of attack against our system, and present candidate implementations. Experiments on Field Programmable Gate Arrays show that the technique is viable, but t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
144
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 244 publications
(148 citation statements)
references
References 13 publications
(17 reference statements)
0
144
0
1
Order By: Relevance
“…It has been discussed in theory and realized in silicon mainly for challenge lengths of 64 bits up to this date [10,11,16,34]. Our attack on such a 64-bit implementation requires the read-out of 2 × 2 32 = 8.58 × 10 9 CRPs by the receiver.…”
Section: Electrical Integrated Pufsmentioning
confidence: 99%
“…It has been discussed in theory and realized in silicon mainly for challenge lengths of 64 bits up to this date [10,11,16,34]. Our attack on such a 64-bit implementation requires the read-out of 2 × 2 32 = 8.58 × 10 9 CRPs by the receiver.…”
Section: Electrical Integrated Pufsmentioning
confidence: 99%
“…The security primitive of a Physical Unclonable Function (PUF) [8], [9], [10], [11] was introduced, at least in part, in order to address some of the above problems. A PUF is a (partly) disordered physical system S that can be challenged with so-called external stimuli or challenges C i , upon which it reacts with corresponding responses termed R Ci .…”
Section: B Physical Unclonable Functions (Pufs)mentioning
confidence: 99%
“…Once this information is known to an adversary, he can numerically derive the same key as the cryptographic hardware embedding the SRAM PUF, and break the system. In the case of Arbiter PUFs, the secret information are the internal runtime delays in the circuit stages [11]. If this information is known, the adversary can numerically simulate the behavior of the PUF output by an additive, linear model, again breaking its security [31].…”
Section: Secret Information In Pufsmentioning
confidence: 99%
“…The idea of using variability-induced delays for authentication and security has been proposed [2,6]. PUFs are one-way functions that map a set of challenges to a set of responses, based on an intractably complex physical system.…”
Section: Topicsmentioning
confidence: 99%