Abstract
Physical unclonable functions (PUFs), a form of physical security primitive, enable digital identifiers to be extracted from devices, such as field programmable gate arrays (FPGAs). Many PUF implementations have been proposed to generate these unique n-bit binary strings. However, they often offer insufficient uniqueness and reliability when implemented on FPGAs and can consume excessive resources. To address these problems, in this article we present an efficient, lightweight, and scalable PUF identification (ID) generator circuit that offers a compact design with good uniqueness and reliability properties and is specifically designed for FPGAs. A novel post-characterisation methodology is also proposed that improves the reliability of a PUF without the need for any additional hardware resources. Moreover, the proposed post-characterisation method can be generally used for any FPGA-based PUF designs. The PUF ID generator consumes 8.95% of the hardware resources of a low-cost Xilinx Spartan-6 LX9 FPGA and 0.81% of a Xilinx Artix-7 FPGA. Experimental results show good uniqueness, reliability, and uniformity with no occurrence of bit-aliasing. In particular, the reliability of the PUF is close to 100% over an environmental temperature range of 25°C to 70°C with ± 10% variation in the supply voltage.
- Georg T. Becker. 2015. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Springer, Berlin, 535--555.Google Scholar
- Mudit Bhargava and Ken Mai. 2014. An efficient reliable PUF-based cryptographic key generator in 65nm CMOS. In Proceedings of the ACM/IEEE Design, Automation and Test in Europe Conference and Exhibition (DATE’14). 1--6. Google Scholar
Digital Library
- Christoph Bohm, Maximilian Hofer, and Wolfgang Pribyl. 2011. A microcontroller SRAM-PUF. In Proceedings of the 5th International Conference on Network and System Security (NSS’11). 269--273.Google Scholar
Cross Ref
- Leonid Bolotnyy and Gabriel Robins. 2007. Physically unclonable function-based security and privacy in RFID systems. In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications, 2007 (PerCom’07). IEEE, 211--220. Google Scholar
Digital Library
- Qingqing Chen, Gyorgy Csaba, Paolo Lugli, Ulf Schlichtmann, and Ulrich Ruhrmair. 2011. The bistable ring PUF: A new architecture for strong physical unclonable functions. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’11). 134--141.Google Scholar
Cross Ref
- Mafalda Cortez, Said Hamdioui, Vincent van der Leest, Roel Maes, and Geert-Jan Schrijen. 2013. Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13). 35--40.Google Scholar
- Jeroen Delvaux and Ingrid Verbauwhede. 2014. Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. IEEE Trans. Circuits Syst. I, Reg. Papers 61, 6 (June 2014), 1701--1713.Google Scholar
Cross Ref
- Achiranshu Gary and Tony T. Kim. 2014. Design of SRAM PUF with improved uniformity and reliability utilizing device aging effect. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’14). IEEE, 1941--1944.Google Scholar
- Blaise Gassend, Dwaine Clarke, Marten van Dijk, and Srinivas Devadas. 2002. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02). ACM, New York, NY, 148--160. Google Scholar
Digital Library
- Chongyan Gu, Yijun Cui, Neil Hanley, and Máire O’Neill. 2016. Novel lightweight FF-APUF design for FPGA. In Proceedings of 29th IEEE International System-on-Chip Conference, (SOCC’16).Google Scholar
Cross Ref
- Chongyan Gu, Julian Murphy, and Máire O’Neill. 2014. A unique and robust single slice FPGA identification generator. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’14). 1223--1226.Google Scholar
Cross Ref
- Chongyan Gu and Máire O’Neill. 2015. Ultra-compact and robust FPGA-based PUF identification generator. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’15).Google Scholar
Cross Ref
- Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, and Pim Tuyls. 2007. FPGA Intrinsic PUFs and Their Use for IP Protection. Springer, Berlin, 63--80 pages.Google Scholar
Digital Library
- Charles Herder, Meng-Day Yu, Farinaz Koushanfar, and Srinivas Devadas. 2014. Physical unclonable functions and applications: A tutorial. Proc. IEEE 102, 8 (2014), 1126--1141.Google Scholar
Cross Ref
- Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. 2009. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput 58, 9 (2009), 1198--1210. Google Scholar
Digital Library
- Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, and Kevin Fu. 2013. DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. Springer, Berlin, 165--179.Google Scholar
- Yohei Hori, Hyunho Kang, Toshihiro Katashita, Akashi Satoh, Shinichi Kawamura, and Kazukuni Kobara. 2014. Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays. J. Inf. Process. 22, 2 (2014), 344--356.Google Scholar
Cross Ref
- Intrisic-ID. accessed 17th June 2015. NXP Secures Over Two Billion Payment and Government ID Cards with SmartMX. Retrieved June 17, 2015 from https://www.intrinsic-id.com/nxp-secures-over-two-billion-payment-and-government-id-cards-/with-smartmx/.Google Scholar
- Raghavan Kumar and Wayne Burleson. 2014. On design of a highly secure PUF based on non-linear current mirrors. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). IEEE Computer Society, 38--43.Google Scholar
Cross Ref
- Sandeep S. Kumar, Jorge Guajardo, Roel Maes, G.-J. Schrijen, and Pim Tuyls. 2008. The butterfly PUF protecting IP on every FPGA. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’08). 67--70. Google Scholar
Digital Library
- Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, and Pim Tuyls. 2009. Reconfigurable physical unclonable functions - enabling technology for tamper-resistant storage. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HST’09). IEEE Computer Society, Washington, DC, 22--29. Google Scholar
Digital Library
- Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2005. Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst 13, 10 (2005), 1200--1205. Google Scholar
Digital Library
- Roel Maes, Pim Tuyls, and Ingrid Verbauwhede. 2008. Intrinsic PUFs from flip-flops on reconfigurable devices. In Proceedings of the 3rd Benelux Workshop on Information and System Security (WISSec’08). Eindhoven, NL, 17.Google Scholar
- Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, and Farinaz Koushanfar. 2013. Combined modeling and side channel attacks on strong PUFs. IACR Cryptology ePrint Archive 2013 (2013), 632. http://eprint.iacr.org/2013/632.Google Scholar
- Abhranil Maiti, Inyoung Kim, and Patrick Schaumont. 2012. A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forens. Secur. 7 (2012), 333--345. Google Scholar
Digital Library
- Abhranil Maiti and Patrick Schaumont. 2012. A novel microprocessor-intrinsic physical unclonable function. In Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL’12). 380--387.Google Scholar
Cross Ref
- Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, and Srinivas Devadas. 2014. Automated design, implementation, and evaluation of arbiter-based PUF on FPGA using programmable delay lines. IACR Cryptology ePrint Archive 2014 (2014), 639.Google Scholar
- Dominik Merli, Frederic Stumpf, and Claudia Eckert. 2010. Improving the quality of ring oscillator PUFs on FPGAs. In Proceedings of the 5th Workshop on Embedded Systems Security (WESS’10). ACM, New York, NY, Article 9, 9 pages. Google Scholar
Digital Library
- Microsemi. Microsemi SmartFusion2 SoC FPGAs Offer More Resources in Low Density Devices With The Lowest Power, Proven Security and Exceptional Reliability. Retrieved June 17, 2015 from http://www.microsemi.com/products/fpga-soc/soc-fpga/smartfusion2.Google Scholar
- Julian Murphy, Máire O’Neill, Frank Burns, Alex Bystrov, Alexandre Yakovlev, and Basel Halak. 2012. Self-timed physically unclonable functions. In Proceedings of the 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS’12). 1--5.Google Scholar
Cross Ref
- Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical one-way functions. Science 297, 5589 (2002), 2026--2030.Google Scholar
- Ed Peterson. 2015. Leveraging Asymmetric Authentication to Enhance Security-Critical Applications Using Zynq-7000 All Programmable SoCs. Retrieved October 2015 from http://www.xilinx.com/support/documentation/white_papers/wp468_asym-auth-zynq-7000.pdf.Google Scholar
- Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, and Jürgen Schmidhuber. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS’10). ACM, New York, NY, 237--249. Google Scholar
Digital Library
- Peter Simons, Erik van der Sluis, and Vincent van der Leest. 2012. Buskeeper PUFs, a promising alternative to D flip-flop PUFs. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’12). 7--12.Google Scholar
- Nicolas Sklavos. 2013. Securing Communication Devices via Physical Unclonable Functions (PUFs). Springer, Wiesbaden, 253--261.Google Scholar
- Ying Su, Jeremy Holleman, and Brian P. Otis. 2008. A digital 1.6 pJ/bit chip identification circuit using process variations. IEEE J. Solid-State Circ. 43 (2008), 69--77.Google Scholar
Cross Ref
- G. Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Annual Design Automation Conference (DAC’07). ACM, New York, NY, 9--14. Google Scholar
Digital Library
- Vincent van der Leest, Geert-Jan Schrijen, Helena Handschuh, and Pim Tuyls. 2010. Hardware intrinsic security from D flip-flops. In Proceedings of the 5th ACM Workshop on Scalable Trusted Computing (STC’10). ACM, New York, NY, 53--62. Google Scholar
Digital Library
- Arunkumar Vijayakumar and Sandip Kundu. 2015. A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics. In Proceedings of the 2015 Design, Automation 8 Test in Europe Conference 8 Exhibition (DATE’15), Wolfgang Nebel and David Atienza (Eds.). ACM, 653--658. http://dl.acm.org/citation.cfm?id=2755903 Google Scholar
Digital Library
- David Wolpert and Paul Ampadu. 2012. Temperature effects in semiconductors. In Managing Temperature Effects in Nanoscale Adaptive Systems. Springer, 15--33.Google Scholar
- Xilinx. 2011. Spartan-6 Family Overview. Retrieved April 29, 2016 from http://www.xilinx.com/support/documentation/data_sheets/ds160.pdf.Google Scholar
- Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, and Kouichi Itoh. 2011. Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches. In Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), Bart Preneel and Tsuyoshi Takagi (Eds.). Springer, Berlin, 390--406. Google Scholar
Digital Library
- Haile Yu, Philip H. W. Leong, and Qiang Xu. 2012. An FPGA chip identification generator using configurable ring oscillators. IEEE Trans. VLSI. Syst. 20, 12 (Dec. 2012), 2198--2207. Google Scholar
Digital Library
Index Terms
Improved Reliability of FPGA-Based PUF Identification Generator Design
Recommendations
Design and Implementation of a Delay-Based PUF for FPGA IP Protection
CADGRAPHICS '13: Proceedings of the 2013 International Conference on Computer-Aided Design and Computer GraphicsPhysical Unclonable Function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA Intellectual Property (IP) protection, key ...
FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures
AbstractPhysically Unclonable Functions (PUFs) are a promising technology and have been proposed as central building blocks in many cryptographic protocols and security architectures. Among other uses, PUFs enable chip identifier/...
FPGA design for timing yield under process variations
Yield loss due to timing failures results in diminished returns for field-programmable gate arrays (FPGAs), and is aggravated under increased process variations in scaled technologies. The uncertainty in the critical delay of a circuit under process ...






Comments