Cryptology ePrint Archive: Report 2017/1134

Attacks on Three PUF-Based Authentication Protocols: PolyPUF, RPUF, and PUF--FSM

Jeroen Delvaux

Abstract: A physically unclonable function (PUF) is a circuit of which the input--output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human. The focus and novelty of this work is the development of efficient impersonation attacks on the following three PUF-based authentication protocols: (1) the so-called PolyPUF protocol of Konigsmark, Chen, and Wong, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2016, (2) the so-called RPUF protocol of Ye, Hu, and Li, as presented at the IEEE conference AsianHOST 2016, and (3) the so-called PUF--FSM protocol of Gao, Ma, Al-Sarawi, Abbott, and Ranasinghe, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2017.

Category / Keywords: physically unclonable function, entity authentication, machine learning

Date: received 23 Nov 2017, last revised 8 Dec 2017

Contact author: jdelvaux at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20171208:232128 (All versions of this report)

Short URL: ia.cr/2017/1134

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]