You are looking at a specific version 20180922:175840 of this paper. See the latest version.

Paper 2018/862

Attacking RO-PUFs with Enhanced Challenge-Response Pairs

Nils Wisiol and Marian Margraf

Abstract

This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all PUF responses after querying the PUF with n+2 attacker-chosen queries. This result renders the proposed RO-PUF with Enhanced Challenge-Response Pairs inapt for most typical PUF use cases, including but not limited to all cases where an attacker has query access.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. IFIP Advances in Information and Communication Technology
DOI
10.1007/978-3-319-99828-2_9
Keywords
PUF
Contact author(s)
nils wisiol @ fu-berlin de
History
2018-09-22: received
Short URL
https://ia.cr/2018/862
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.