Delay based Physical Unclonable Function for Hardware Security and Trust

Hardware security has become an important concern today. As the design passes on through many hands, there are chances that some malicious circuits can be introduced by the attackers. In addition, unauthorized people may try to access the IC and read or even change the information stored. To prevent accessing of device by unauthorized persons, Physical Unclonable Function (PUF) is invented. PUF, which has unique response for a given challenge, is a function which is easy to evaluate but not easy to replicate. Several PUF structures were proposed in literature for both ASIC and FPGA to improve the metrics, mainly uniqueness and uniformity. But the maximum uniqueness achieved by these structures is 40%. In this paper, we present a strong PUF which produces several Challenge Response Pairs (CRPs) and also improves uniqueness. This PUF structure is a combination of Flip Flop based Arbiter PUF (FF APUF) and XOR PUF. This PUF is implemented on Virtex 6, Spartan 6 and Spartan 3 FPGAs and its uniqueness is evaluated and is compared with that of FF APUF. Our XOR FF APUF gives uniqueness of 46% on Virtex 6, 43% on Spartan 3 and 48% on Spartan 6 boards which is higher than that of FF APUF by 14%, 16% and 7% respectively.

[1]  Yier Jin,et al.  Introduction to Hardware Security , 2015, Electronics.

[2]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[3]  Marcian N. Cirstea,et al.  Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.

[4]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[5]  Yu Zhuang,et al.  An experimental study of the state-of-the-art PUFs implemented on FPGAs , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[6]  Akashi Satoh,et al.  Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.

[7]  K. Harish,et al.  Malicious Circuit Detection for Improved Hardware Security , 2015, SSCC.

[8]  Ramesh Bhakthavatchalu,et al.  Implementing delay based physically unclonable functions on FPGA , 2016, 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[9]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[10]  Roel Maes Physically Unclonable Functions: Concept and Constructions , 2013 .

[11]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[12]  M. Nirmala Devi,et al.  Malicious hardware detection and design for trust: An analysis , 2017 .

[13]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.