Physical Unclonable Functions and Applications: A Tutorial

Charles Herder, Meng-Day Yu, Farinaz Koushanfar, Srinivas Devadas
2014 Proceedings of the IEEE  
| This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: "strong PUFs" and "weak PUFs." It describes strong PUF implementations and their use for lowcost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF
more » ... s and their use in key generation applications. It covers error-correction schemes such as pattern matching and index-based coding. Finally, this paper reviews several emerging concepts in PUF technologies such as public model PUFs and new PUF implementation technologies.
doi:10.1109/jproc.2014.2320516 fatcat:5vlcesm54fhxjparjkhhu5dn6a