Professional Documents
Culture Documents
Amritapuri, India
samrass1997@gmail.com1 , sreeharikn@am.amrita.edu2 ,rameshb@am.amrita.edu3
Abstract—For data storage and protection, encryption is an each IC by using randomness throughout the manufacturing
important standard. A secret key is required in order to encrypt process. [2]. Device-dependent keys or device identification
or decrypt data. This key is typically located in memory, where codes can be generated from this signature This method has
it can potentially be stolen. In order to avoid this, new methods
of generating secret keys have been developed.To safeguard the the main advantage of requiring no key to be stored in the
generation of the secret key, one of these techniques is to utilise device, which makes it harder to disclose[3].
a Physically Unclonable Function (PUF). In order to generate The following is how the rest of the paper is divided: section
secret keys or simple authentication protocols, secrets can be II explains details about pufs,classification,structures,quality
extracted from the physical structure of the device. A stable features,application. Section III discusses on
PUF output is essential for generating cryptographic keys with
greater uniqueness, randomness, and uniformity. The goal is to APUF,ROPUF.Section IV describes about cryptography
offer device identification methods that are inexpensive, efficient, and AES in detail. Proposed design is explained in section
and safe, as well as secure cryptographic key creation using PUFs. V. The final results and schematic comes under section VI .
This paper propose a design that combines ring oscillator puf Finally comes the conclusion and future scope in the section
(ROPUF), Arbiter puf (APUF) and Exclusive OR gate. Verilog VII and VIII.
simulation is performed using VIVADO software. AES algorithm
is implemented for encryption and decryption for cryptographic II. PHYSICALLY UNCLONABLE FUNCTIONS -
key generation. The experimental results shows the uniqueness,
reliability, uniformity and aliasing has improved. PUF S
Index Terms—PUF, secret key,ROPUF, APUF, cryptographic Physical Uncloble Functions or PUFs is a new technology
key generation,FPGA, Xilinx Vivado emerging in the current world and one that widely used
primitive hardware. Using differences in physical properties
I. I NTRODUCTION or performance provide a unique digital signature [4]. This
Since last few years, people have been increasingly using unique ID or the key is like a human fingerprint that there
smart objects for storing confidential information. Digitization are no two devices can have the same key. It works based
has made it possible for people to save information on their on responding to a challenge pair. Challenges the input we
mobile devices and laptops. Not only must a device be offer in puf as well the answers are the results produced
authenticated via secret keys, passwords, and other methods, by puf. As PUF uses a variety of body structures all PUF
but it must also be authenticated with the device itself. As a structures it will differ internally and respond in the same
result, both the software and the hardware must be verified. way the challenge thus provided a unique answer. This is the
There is a significant issue with traditional security methods outfit PUF can be used for simple verification [5] as well as
that store digital keys. generating secret keys. PUFs appeared on the scene just when
The goal of this study is to define Physically Unclonable classical cryptography had failed to protect against physical
Functions (PUFs), which are unique challenge-response enti- attacks, side channel attacks, and other threats. One of the
ties embedded in physical devices. A physically unclonable most significant advantages of PUF over key cryptographic-
function (PUF) is commonly used in cryptography to generate based keywords systems [6] is that it does not require the
random numbers, generate secret keys, and verify identities. storage of secrecy keys in fixed memory e.g. the secret key
PUFs are devices that are easy to make, but are virtually im- is hidden inside the device itself. The device itself is the key
possible to duplicate. PUFs are unclonable due to the random to action PUF is secure and is a promising and economical
components they contain due to manufacturing variation.[1]. In method for cryptographic primitives.
comparison to existing cryptographic systems, a big advantage PUFs (Physically Unclonable Functions) are a new type of
of the method is that there are never any digital copies of secret authentication device that protects against a wide range of
keys involved. Security is maintained by the device itself, production as well as cryptographic key creation. Security
which makes PUFs resistant to intrusions. Another benefit in integrated circuits (ICs) have become a major problem
of PUF-based cryptographic primitives is that they are cost due to high security information requirements. To ensure
effective, so they are suited to large-scale production. authenticity and confidentiality, cryptographic keys are used
Physical Unclonable Functions (PUFs) are a key generation to encrypt information. Several solutions have been suggested
alternative to TRNGs. PUFs calculate a unique signature for to be key each generation, each with its own advantages and
2
Authorized licensed use limited to: Northeastern University. Downloaded on February 12,2024 at 17:25:48 UTC from IEEE Xplore. Restrictions apply.
Due to statistical process differences, the RO PUF is made IV. C RYPTOGRAPHY
up of identically mapped ring oscillators, each of which The security of network communications is critical in e-
oscillates at a different frequency. Each input Challenge is commerce and other network applications, for example. The
sent to the multiplexers’ selection lines, which choose a pair usage of cryptography, on the other hand, goes much beyond
of oscillators and compare them to generate a fixed number the ease of confidentiality. Cryptography, in particular, enables
of output responses. If all oscillators are mapped identically, network businesses and customers to ensure the integrity of
process changes define the frequency’s uniqueness. Chip to their services. If the current trend in the global e-market con-
chip, the output response differs. Another problem of RO PUFs tinues, better cryptographic measures to protect commercial
is that they require one pair of ring oscillators per bit of output, transactions would be required. A hacker or an eavesdropper
requiring a large number of ring oscillators to collect enough could make sensitive information posted on an open network
output bits for a safe level. anonymous.This is accomplished by converting messages into
a strange object form via a mathematical formula known
as an encryption algorithm. To extract the original message,
B. Arbiter PUFs in detail
the intended recipient uses an encryption method.There are
various types of information that must be protected in this
way over open networks, such as bank account information,
credit card transactions, or personal health or tax records.
Cryptosystems can provide services such as confidentiality,
authenticity, integrity, and non-infringement. It doesn’t provide
you access to any information or systems.
3
Authorized licensed use limited to: Northeastern University. Downloaded on February 12,2024 at 17:25:48 UTC from IEEE Xplore. Restrictions apply.
V. PROPOSED DESIGN
Physical Unclonable functions or PUFs are the newly evolv-
ing technology in the current world and is the one of the
most commonly used hardware primitive. It makes use of the
variations in the physical properties or the manufacturing to
provide a unique digital signature[4]. This unique identity/
key is a parallel to human fingerprint that no two devices
can have the same key. It works based on challenge response
pair. Challenges are the input we provide to the puf and
responses are the outputs generated by the puf. Since PUF
utilizes the variation in physical properties every PUF structure
will be internally different and responds differently to the same
challenge thereby giving unique response.This PUF attribute
can be utilised for simple authentication[5] as well as the
generation of secret keys. PUFs emerged at a time when
standard cryptography was failing to protect against physical Fig. 6. Arbiter PUF Waveform
attacks, modelling attacks, side channel attacks, and other
threats. One of the most significant advantages of PUF over
typical cryptographic systems based on keys[6] is that it does
not require secret keys to be stored in nonvolatile memory, i.e.
the secret key is hidden within the physical device itself. The
device is the key to the PUF’s security, and it appears to be a
promising cost-effective way for cryptographic primitives.
4
Authorized licensed use limited to: Northeastern University. Downloaded on February 12,2024 at 17:25:48 UTC from IEEE Xplore. Restrictions apply.
Fig. 9. AES 128 Encryption
5
Authorized licensed use limited to: Northeastern University. Downloaded on February 12,2024 at 17:25:48 UTC from IEEE Xplore. Restrictions apply.
by restricting functionality, reducing testing and debugging, [15] Maiti, A., Casarona, J., McHale, L., Schaumont, P. (2010). ’A
limiting the frequency, excessive area and power overhead and large scale characterization of RO-PUF’. 2010 IEEE International
Symposium on Hardware- Oriented Security and Trust (HOST).
so on. An integrated structure of ROPUF and APUF has been doi:10.1109/hst.2010.5513108
proposed here for enhancing the security. A key advantage of [16] Rahman, M. T., Forte, D., Fahrny, J., Tehranipoor, M. (2014).’ ARO-
the proposed model is that it is using the existing components PUF: An aging-resistant ring oscillator PUF design.’ Design, Au-
tomation Test in Europe Conference Exhibition (DATE), 2014.
in the wrapper to enhance the security, there by reducing the doi:10.7873/date.2014.082
area overhead. Thus the proposed model helps to overcome [17] Shital Joshi, Saraju P. Mohanty, and Elias Kougianos , ”Everything You
all the problems faced by existing models. Wanted to Know About PUFs,” 2017 IEEE Potentials.
[18] Prof. Lalu V,Riya S. S.. ’A dynamically configurable LFSR-based PUF
The use of cryptographic primitives like PUF is increasing design against machine learning attacks,’ CCF Transactions on High
day by day and its usage has reached vast different areas. Performance Computing. 3. 10.1007/s42514-020-00060-7.
However, even though security is boosted by such methods, [19] Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., Ruhrmair, U. (2011).
’Stable cryptographic key generation using SRAM based Physical Un-
more and more vulnerabilities with the existing securities are clonable Function’. Proceedings of the International Conference on
being explored and exposed.A higher order LFSR and higher Smart Electronics and Communication (ICOSEC 2020)
order challenge response pair for the PUF can be added to [20] Chongyan Gu, Maire O’Neill,’ .Ultra-compact and Robust FPGA-based
PUF Identification Generator’.,2015 IEEE International Symposium on
further improve security. Furthermore, the PUF that will be Circuits and Systems (ISCAS)
used can be a more powerful version than the existing ROPUF. [21] Sriram Sankaran, Shivshankar Sand Nimmy K,’ LHPUF: Lightweight
Also, the LFSR utilised could be a more powerful one, with Hybrid PUF for enhanced security in Internet of Things’., 2018 IEEE
International Symposium on Smart Electronic Systems (iSES) (Formerly
a complex nonlinear polynomial that is difficult to crack. iNiS)
[22] Mahin Anil Kumar1 and Ramesh Bhakthavatchalu,.’ FPGA based
R EFERENCES delay PUF Implementation for Security Applications’., 2017 IEEE
[1] Erik Sargent and Weston Jense, ”Authentication Using a Physically International Conference on Technological Advancements in Power and
Unclonable Function,” in IEEE Design Test of Computers, vol. 27, Energy(TAP Energy )
no. 1, pp. 36-47, Jan.-Feb. 2015 [23] Sai kiran N H N and Ramesh Bhakthavatchalu,’ Implementing Delay
[2] Srinivas Devadas and G. Edward Suh, ”Physical Unclonable Functions Based Physically Unclonable Functions on FPGA ’., 2016 International
for Device Authentication and Secret Key Generation,” in Devadas;2007 Conference on Advanced Communication Control and Computing Tech-
44th ACM/IEEE Design Automation Conference nologies (ICACCCT)
[3] Mohammad Javad Parvardeh and Shahriar Baradaran Shokouhi, ”A Ring
Oscillator PUF Architecture With Enhanced Challenge-Response Set,”
9th International Conference on Computer and Knowledge Engineering
(ICCKE 2019), October 24-25 2019, Ferdowsi University of Mashhad.
[4] Randa, Maulana Bozdal, Mehmet Samie, Mohammad Jennions,
I.K.. (2018). Layered Security for IEEE 1687 Using a Bimodal
Physically Unclonable Function. Procedia Manufacturing. 16. 24-30.
10.1016/j.promfg.2018.10.154.
[5] P. Kumar and S. Kamatchi, ”A Secure, Area Efficient Strong Physical
Unclonable Function Design using LFSR,” 2020 International Confer-
ence on Smart Electronics and Communication (ICOSEC), 2020, pp.
1145-1149, doi: 10.1109/ICOSEC49089.2020.9215447.
[6] Suh, G.E., Devadas, S.: ‘Physical unclonable functions for device
authentication and secret key generation’. Proc. 44th Annual Design
Automation Conf., 2007, pp. 9–14
[7] Filip Kodytek and R ´ obert L ´ orenczi, ”, A design of ring oscillator
based PUF on FPGA,” 2015 IEEE 18th International Symposium on
Design and Diagnostics of Electronic Circuits Systems.
[8] Nitin Pundir, Fathi Amsaad, Muhtadi Choudhury, and Mohammed Nia-
mat, ”Novel Technique to Improve Strength of Weak Arbiter PUF,”978-
1-5090-6389-5/17/31.002017IEEE.
[9] Justin Cox and Tyler Travis, ”Secret Key Generation on a FPGA using
a PUF”.
[10] [8] Prof. Lalu V,Riya S. S.(2020), ”Stable cryptographic key generation
using SRAM based Physical Unclonable Function ,” Proceedings of
the International Conference on Smart Electronics and Communication
(ICOSEC 2020)..
[11] S. K. K., N. Satheesh, A. Mahapatra, S. Sahoo and K. K. Mahapatra,
”Securing IEEE 1687 Standard On-chip Instrumentation Access Using
PUF,” 2016 IEEE International Symposium on Nanoelectronic and In-
formation Systems (iNIS), 2016, pp. 56-61, doi: 10.1109/iNIS.2016.024.
[12] Poorna Sai Meka, Sivaraman Amirtharajan Rengarajan, Sundararaman
Ra jagopalan, ”Metastability Influenced PUF for Cryptographic Key
Generation,” 2020 IEEE A FPGA Approach International Conference
on Computer Communication and Informatics
[13] [10] Mohammed Saeed Alkatheiri;Yu Zhuang;Mikhail Korobkov;Abdur
Rashid Sangi, ”).An experimental study of the state-of-the-art PUFs
implemented on FPGAs ,” in FPGAs IEEE Conference on Dependable
and Secure Computing 2017.
[14] Xin, X., Kaps, J.-P., Gaj, K. (2011). ’A Configurable Ring-Oscillator-
Based PUF for Xilinx FPGAs ’. 2011 14th Euromicro Conference on
Digital System Design.doi:10.1109/dsd.2011.88
6
Authorized licensed use limited to: Northeastern University. Downloaded on February 12,2024 at 17:25:48 UTC from IEEE Xplore. Restrictions apply.