2010 Reports :  Cryptology ePrint Archive Forum
Discussion forum for Cryptology ePrint Archive reports posted in 2010. Please put the report number in the subject.  
Goto Thread: PreviousNext
Goto: Forum ListMessage ListNew TopicSearchLog In
2010/251 PUF exaggeration
Posted by: djb (IP Logged)
Date: 05 May 2010 08:10

The authors of 2010/251 are wildly exaggerating the impact of their results when they claim that they can clone many types of PUFs and thus break "essentially all" PUF applications and protocols.

The easiest way to understand this is to consider the classic _linear_ PUFs (the original optical PUFs using speckle patterns). For these PUFs, the type of "break" carried out in 2010/251 is trivial by design: anyone with access to the PUF can easily see the PUF behavior and build a _large_ device (camera + laptop + projector) that simulates the PUF. The PUF is nevertheless unbroken: the attacker is unable to manufacture a _small_ device that simulates the PUF. The PUF user verifies the PUF size, of course.

---D. J. Bernstein
Research Professor, Computer Science, University of Illinois at Chicago

Re: 2010/251 PUF exaggeration
Posted by: boskom (IP Logged)
Date: 17 May 2011 18:29

luzagodom Wrote:
-------------------------------------------------------
> 2010/251 PUF exaggeration. Posted by: djb (IP
> Logged). Date: 05 May 2010 08:10. The authors of
> 2010/251 are wildly exaggerating the impact of
> their results


I must say that I desagree, but that is my opinion.



Please log in for posting a message. Only registered users may post in this forum.