2012
DOI: 10.1007/978-3-642-33027-8_18
|View full text |Cite
|
Sign up to set email alerts
|

PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator

Abstract: Abstract. We present PUFKY: a practical and modular design for a cryptographic key generator based on a Physically Unclonable Function (PUF). A fully functional reference implementation is developed and successfully evaluated on a substantial set of FPGA devices. It uses a highly optimized ring oscillator PUF (ROPUF) design, producing responses with up to 99% entropy. A very high key reliability is guaranteed by a syndrome construction secure sketch using an efficient and extremely low-overhead BCH decoder. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
228
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 211 publications
(233 citation statements)
references
References 27 publications
4
228
0
1
Order By: Relevance
“…A number of different algorithms have been proposed in the literature, such as the original RO-PUF proposal [6], the PUFKY [1] or the SUM-PUF [18]. In order to not limit our analysis to a specific algorithm we only implemented the core RO on the FPGA.…”
Section: Fpga Ring-oscillator Design Under Testmentioning
confidence: 99%
See 2 more Smart Citations
“…A number of different algorithms have been proposed in the literature, such as the original RO-PUF proposal [6], the PUFKY [1] or the SUM-PUF [18]. In order to not limit our analysis to a specific algorithm we only implemented the core RO on the FPGA.…”
Section: Fpga Ring-oscillator Design Under Testmentioning
confidence: 99%
“…where σ is the standard deviation among repetitions and N the number of repetitions, which equals D/D et in our case 1 . Thus, the standard deviation of the sample mean can be written as a function of the overall evaluation time D…”
Section: B Frequency Precision Vs Evaluation Timementioning
confidence: 99%
See 1 more Smart Citation
“…Currently, secure sketch implementations rely on the (n − k) upper bound on the min-entropy loss, e.g., [23]. Unfortunately, this leads to an overly conservative design when instantiating security parameters accordingly.…”
Section: Tight Bounds On the Min-entropy Lossmentioning
confidence: 99%
“…Prior work focussed on repetition codes only. Although frequently used as the inner code of a concatenated code [5], full-fledged key generators [23] typically rely on non-trivial codes, e.g., BCH codes [18]. Second, our techniques may be applied to a variety of distributions, while prior work covered biased distributions only.…”
Section: Tight Bounds On the Min-entropy Lossmentioning
confidence: 99%