Final Paper PUF 2 Repaireddocx-2024-11!04!15-20
Final Paper PUF 2 Repaireddocx-2024-11!04!15-20
FOR
1. INTRODUCTION
2
verse engineering, and hardware Trojan attacks [2].In the context Saeed Aghapour et al., [4] the enhancement of security and per-
of PUFs, they are generally classified into two main categories:
strong PUFs and weak PUFs[3], While those PUFs with a limited
num- ber of Challenge-Response Pairs(CRPs) are categorized as
weak PUFs, like RO-PUFs. Furthermore, RO-PUF has
demonstrated ex- ceptional suitability for implementation in both
FPGAs and ASICs. This is due to the RO PUF’s ability to offer a
simple fabrication process and exceptional security advantages.
However, Weak PUFs offer better stability and unique response
characteristics compared to the existing strong PUF design.
2. LITERATURE REVIEW:
N. Sivasankari et al.,[1] proposed a hybrid ring oscillator struc-
ture for enhancing uniqueness and reliability. The experiments
were conducted on Xilinx FPGAs with a certain challenging set
and
Produce unique responses only for the concerned chip. In the
ex- perimental analysis, the proposed design increases the circuit
com- plexity, but the power consumption seems to be the same as
the traditional designs.
Husam Kareem et al.,[2] introduce a configurable inversion unit
designed to construct a lightweight, robust architecture configurable
(RAC) RO-PUF. The proposed unit comprises an XOR gate, an
XNOR gate, and a multiplexer. The RACRO-PUF significantly
in- creases the size of generated output bits while efficiently
utilizing minimal hardware resources. The performance of the
RACRO-PUF stands out in evaluations, recording a uniqueness of
49.78 %, uni- formity of 49.42 %, reliability of 97.72 %, and
impressive random- ness of 98.34 %.
Alireza Shamsoshoara et al.,[3] categorized PUFs based on
their applications as 1) low-cost authentication and 2) secure key
gener- ation are two main applications for PUFs. Based on these,
“Strong PUF” and “Weak PUF” are delineated. In most scenarios,
strong PUFs are utilized for authentication, and weak PUFs are
employed for key storage. PUFs can be shaped as a black-box
challenge- response system. It means that, similar to a function,
there is an input for the PUF which is called challenge c and based
on the function f(c), response r will be calculated. In this black
box, f() explains the relationship between challenge and response.
The do- main of f() and the number of challenges each PUF can
process are the leading differences between strong and weak
PUFs.
3
formance of Crystals-cyber algorithm, by including PUFs, and
ran- dom number generators. PUFs generate the response by
collecting the variations due to manufacturing defects, this
creates a device- specific response. The true Random Number
generator generates noise from physical proceeds, like thermal
noise. Both PUFs and TRNGs are integrated to derive a
cryptographic key, to ensure ran- domness and security.
4
Edit this article on Typeset