Conclusion and Future Work

In this book, the topic of physically unclonable functions was covered in an all-encompassing manner, introducing the PUF concept and the multitude of their constructions, listing and defining their properties, and finally detailing their most important a

  • PDF / 91,063 Bytes
  • 4 Pages / 441 x 666 pts Page_size
  • 81 Downloads / 197 Views

DOWNLOAD

REPORT


Conclusion and Future Work

7.1 Conclusions PUFs are physical security primitives which enable trust in the context of digital hardware implementations of cryptographic constructions, in particular they are able to initiate physically unclonable and secure key generation and storage. In this book we have studied physically unclonable functions or PUFs, in particular: (i) their concept and constructions, (ii) their properties, and (iii) their applications as a physical root of trust, and the relations between these three. In Chap. 2 we introduced the concept of a physically unclonable function in great detail through an extensive study and analysis of earlier work and existing constructions. Based on similar and distinguishing construction characteristics, we discussed strengths and weaknesses and possible classifications. The most noteworthy identified subclass is so-called intrinsic PUFs, i.e. PUF constructions which are based on internal evaluations of implicitly obtained random creation features, because they are particularly well-fit for integration in larger security systems. It is however difficult to compare the practical value of different proposals from the literature due to a wide variety of implementation technologies and experimental considerations. The lateral overview does present a good insight in recurring intrinsic PUF implementation techniques: (i) amplification of microscopic unique features through differential measurement, (ii) physical enhancement of PUF behavior through low-level (design-intensive) implementation control, and (iii) algorithmic behavioral improvement through adapted post-processing techniques. In Chap. 3 we identified the most important usability and physical security properties attributed to PUFs and we introduced clear definitions pointing out what exactly each of these properties signify. Through a comparative analysis on a representative subset of PUF constructions and a number of important non-PUF reference cases, we discovered which properties are really defining for a PUF construction, and which are convenient additions but are in no way guaranteed for every PUF. As it turns out, the core defining property of a PUF is its physical unclonability. A second contribution of this chapter was the introduction of a formal framework R. Maes, Physically Unclonable Functions, DOI 10.1007/978-3-642-41395-7_7, © Springer-Verlag Berlin Heidelberg 2013

169

170

7 Conclusion and Future Work

for using PUFs, and more general physical security primitives, in theoretical security reductions at a higher level. We defined robustness, physical unclonability and unpredictability in this framework. With the goal of testing their security and usability characteristics as accurately and as objectively as possible, we implemented and evaluated eight different intrinsic PUF constructions on a 65 nm CMOS silicon platform. The design process and the experimental results of this ASIC chip are described in detail in Chap. 4. The measurements of each of these eight constructions were tested for the