You are looking at a specific version 20171208:232128 of this paper. See the latest version.

Paper 2017/1134

Attacks on Three PUF-Based Authentication Protocols: PolyPUF, RPUF, and PUF--FSM

Jeroen Delvaux

Abstract

A physically unclonable function (PUF) is a circuit of which the input--output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human. The focus and novelty of this work is the development of efficient impersonation attacks on the following three PUF-based authentication protocols: (1) the so-called PolyPUF protocol of Konigsmark, Chen, and Wong, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2016, (2) the so-called RPUF protocol of Ye, Hu, and Li, as presented at the IEEE conference AsianHOST 2016, and (3) the so-called PUF--FSM protocol of Gao, Ma, Al-Sarawi, Abbott, and Ranasinghe, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2017.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
physically unclonable functionentity authenticationmachine learning
Contact author(s)
jdelvaux @ esat kuleuven be
History
2019-01-09: last of 5 revisions
2017-11-27: received
See all versions
Short URL
https://ia.cr/2017/1134
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.