Professional Documents
Culture Documents
Abstract—Having a robust and tamper proof structure, re- Many authentication protocols have been proposed recently.
cently proposed pyhsical unclonable functions (PUF) are consid- However, it is shown that majority of these proposals do not
ered as a promising instrument that would be used for secure key provide security [7], [8], [9], [10], [11], [12], [13], [14]. In
generation and storage, integrated circuit (IC) authentication and
generating chip-unique signatures. We describe a delay-based fact, those satisfying the security measures mostly suffer from
PUF architecture suitable for RFID devices mostly suffer from addressing the requirements to a satisfactory extend.
low computational power and tiny sillicon area. In order to match In this study, our goal is to investigate the use of PUF
these constraints, we design a mux and an arbiter based PUF cir- circuits in RFID systems. We design a delay-based PUF
cuit that is implemented on an Field Programmable Gate Array architecture consist of a mux and an arbiter that matches the
(FPGA) for experimental purposes. Based on our measurements
which is extended to variable environmental conditions, we state low power and tiny area constraints of RFID systems. We
the length of a reliable PUF circuit. implement our design on FPGAs for experimental purposes.
Based on our measurements which is extended to variable
I. I NTRODUCTION environmental conditions, we state the length of a reliable PUF
Mechanisms emerging the IC authentication, IP (intellectual circuit.
property) protection, secure key generation and storage, ran- The outline of the paper is the following. In Section II, we
dom number generation are some of the real world problems briefly describe the physically one-way and unclonable func-
that industry eagerly seeks for efficient solution. Most of tions as well as the multiplexer based PUF circuits. Section IV
the considerable proposals to these intense problems involve explains our implementation details where in Section V,
complicated cryptographic schemes and procedures that bring measurements including setup circuit length determination,
extra burden on system design. Moreover, if the target platform temperature and voltage measurements are compared and
is a constraint environment, this burden is amplified and discussed. Finally, we conclude in Section VI.
even the most efficient solutions become infeasible. Therefore,
II. M ATHEMATICAL BACKGROUND
designers tend to use the ad-hoc methods that possibly have
serious security risks. However, having a robust and tamper A. Physically one-way functions
proof structure, recently proposed physically unclonable func- One-way functions are a mainstay of public-key cryptog-
tions (PUF) attracted the interest of the security community, raphy [15]. The concept of one-way function, shows itself
and many schemes containing PUF components have been in a very practical context. Think of a computer system that
proposed [1], [2], [3], [4], [5], [6]. contains multiple user accounts. Whenever an account is built,
The authentication problem in RFID systems has a similar the user chooses a password and it’s raw form is saved to
nature that could find some answers in PUF realizations. As the system’s password file. Passwords are asked to the users
a result of their low production costs and tiny size, RFID in every entry attempt and received passwords are compared
tags are considered as the replacement technology for bar with registered ones. In such a situation the security of the
codes and other means of traditional identification tools which user verification depends on the security of password files.
traditionally find many applications in manufacturing, supply Needham recognizes that the authentication process could be
chain management and inventory control. made without really knowing the passwords. According to
Although, public key cryptography has the necessary prim- his system whenever a user enters the password P W , system
itives to solve this kind of problem in typical networks, automatically calculates f (P W ) function and saves this value
implementing these primitives on RFID nodes seems not instead of the password. When a user wants to login, the user
possible. In fact, it is a challenging task to design authen- should enter the password X and the computer compares f (X)
tication protocols for low-cost RFID tags resisting all of the and f (P W ). If two values are equivalent, users could enter
known attacks and threats and at the same time fulfill the so the system. Whenever, the function f is chosen as a one-way
called RFID tag specifications implying serious cost margins. function even if f and f (P W ) are known, it is difficult to
calculate the password.
The authors would like to thank to the anonymous reviewers for their
helpful comments in improving this presented material. This study is partially In other words, one-way functions are easy calculate but
funded by TUBITAK research project No: 109E180. difficult to reverse. In fact, it is possible to have multiple
B. Measurement Setup