In this paper we modify a number of protocols involving CPUFs in order to improve their security. Our modifications mainly consist of encrypting a larger portion of the message traffic, and additional restrictions on the CPUF accessibility. We simplify the description of CPUF protocols by using flowchart notation. Furthermore we explicitly show how the helper data for the PUFs is handled.
Category / Keywords: cryptographic protocols / Physical Unclonable Function Date: received 3 Jul 2009 Contact author: b skoric at tue nl Available format(s): PDF | BibTeX Citation Version: 20090707:215607 (All versions of this report) Short URL: ia.cr/2009/328 Discussion forum: Show discussion | Start new discussion