4.5 Article

Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCAD.2014.2370531

关键词

Helper data algorithm (HDA); key generation; physically unclonable function (PUF)

资金

  1. European Commission through the ICT Programme [FP7-ICT-2011-317930 HINT]
  2. Research Council of KU Leuven: GOA TENSE [GOA/11/007]
  3. Flemish Government [FWO G.0550.12N]
  4. Hercules Foundation [AKUL/11/19]
  5. National Major Development Program for Fundamental Research of China (973 Plan) [2013CB338004]
  6. IWT-Flanders [SBO 121552]

向作者/读者索取更多资源

Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. Third, we identify several hiatuses/open problems in existing literature.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据