Strong authentication with physical unclonable functions

P.T. Tuyls, B. Skoric

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Downloads (Pure)

    Abstract

    Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic key material in an unclonable way. They can be employed for strong authentication of objects, e.g., tokens, and of persons possessing such tokens, but also for other purposes. We give a short overview of security applications where PUFs are useful, and discuss physical realisations, noisy measurements and information content of PUFs. Then we describe an integrated authentication token containing an optical PUF, a challenging mechanism and a detector. Finally, we discuss authentication protocols for controlled and uncontrolled PUFs.
    Original languageEnglish
    Title of host publicationSecurity, Privacy and Trust in Modern Data Management
    EditorsM. Petkovic, W. Jonker
    Place of PublicationBerlin
    PublisherSpringer
    Chapter10
    Pages133-148
    ISBN (Print)978-3-540-69860-9
    DOIs
    Publication statusPublished - 2007

    Publication series

    NameData-Centric Systems and Applications
    ISSN (Print)2197-9723

    Fingerprint Dive into the research topics of 'Strong authentication with physical unclonable functions'. Together they form a unique fingerprint.

  • Cite this

    Tuyls, P. T., & Skoric, B. (2007). Strong authentication with physical unclonable functions. In M. Petkovic, & W. Jonker (Eds.), Security, Privacy and Trust in Modern Data Management (pp. 133-148). (Data-Centric Systems and Applications). Springer. https://doi.org/10.1007/978-3-540-69861-6_10