Authentication Algorithm for Portable Embedded Systems using PUFs
Authentication Algorithm for Portable Embedded Systems using PUFs
Article PDF

Keywords

trapdoor function
soft PUF
physical unclonable functions
challenge–response authentication

How to Cite

Sunil Devidas Bobade, & Dr. Vijay R. Mankar. (2015). Authentication Algorithm for Portable Embedded Systems using PUFs. Global Journal of Computer Science and Technology, 15(G1), 9–11. Retrieved from https://gjcst.com/index.php/gjcst/article/view/1036

Abstract

Physical Unclonable Functions PUFs are circuits that exploit chip-unique features to be used as signatures which can be used as good silicon biometrics These signatures are based on semiconductor fabrication variations that are very difficult to control or reproduce These chipunique signatures together with strong challenge-response authentication algorithm can be used to authenticate and secure chips This paper expands the security avenues covered by PUF and FPGAs by introducing a new class of concept called Soft PUFs This scheme propose robust challenge- response authentication solution based on a PUF device that provides stronger security guarantees to the user than what previously could be achieved By exploiting the silicon uniqueness of each FPGA device and incorporating a special authentication algorithms in existing FPGA fabric FPGA based embedded systems can be used for new security-oriented and network- oriented applications that were not previously possible or thought of
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2015 Authors and Global Journals Private Limited