Paper 2017/1134
Attacks on Three PUF-Based Authentication Protocols: PolyPUF, RPUF, and PUF--FSM
Jeroen Delvaux
Abstract
A physically unclonable function (PUF) is a circuit of which the input--output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human. The focus and novelty of this work is the development of efficient impersonation attacks on the following three PUF-based authentication protocols: (1) the so-called PolyPUF protocol of Konigsmark, Chen, and Wong, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2016, (2) the so-called RPUF protocol of Ye, Hu, and Li, as presented at the IEEE conference AsianHOST 2016, and (3) the so-called PUF--FSM protocol of Gao, Ma, Al-Sarawi, Abbott, and Ranasinghe, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2017.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- physically unclonable functionentity authenticationmachine learning
- Contact author(s)
- jdelvaux @ esat kuleuven be
- History
- 2019-01-09: last of 5 revisions
- 2017-11-27: received
- See all versions
- Short URL
- https://ia.cr/2017/1134
- License
-
CC BY