Cryptology ePrint Archive: Report 2009/328
Flowchart description of security primitives for Controlled Physical Unclonable Functions
Boris Skoric and Marc X. Makkes
Abstract: Physical Unclonable Functions (PUFs) are
physical objects that are unique, practically unclonable and that
behave like a random function when subjected to a challenge.
Their use has been proposed for
authentication tokens and anti-counterfeiting.
A Controlled PUF (CPUF) consists of a PUF and a control layer
that restricts a user's access to the PUF input and output.
CPUFs can be used for secure key storage, authentication, certified
execution of programs, and certified measurements.
In this paper we modify a number of protocols
involving CPUFs in order to improve their security.
Our modifications mainly consist of encrypting a
larger portion of the message traffic, and
additional restrictions on the CPUF accessibility.
We simplify the description of CPUF protocols by using
Furthermore we explicitly show how the helper data for the PUFs
Category / Keywords: cryptographic protocols / Physical Unclonable Function
Date: received 3 Jul 2009
Contact author: b skoric at tue nl
Available formats: PDF | BibTeX Citation
Version: 20090707:215607 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]