Home > Research > Publications & Outputs > A PUF Taxonomy

Electronic data

  • Manuscript

    Accepted author manuscript, 1.36 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

  • 1.5079407

    Final published version, 3.22 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

A PUF Taxonomy

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

A PUF Taxonomy. / McGrath, Thomas; Bagci, Ibrahim Ethem; Wang, Zhiming et al.
In: Applied Physics Reviews, Vol. 6, No. 1, 011303, 03.2019.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

McGrath, T, Bagci, IE, Wang, Z, Roedig, U & Young, RJ 2019, 'A PUF Taxonomy', Applied Physics Reviews, vol. 6, no. 1, 011303. https://doi.org/10.1063/1.5079407

APA

McGrath, T., Bagci, I. E., Wang, Z., Roedig, U., & Young, R. J. (2019). A PUF Taxonomy. Applied Physics Reviews, 6(1), Article 011303. https://doi.org/10.1063/1.5079407

Vancouver

McGrath T, Bagci IE, Wang Z, Roedig U, Young RJ. A PUF Taxonomy. Applied Physics Reviews. 2019 Mar;6(1):011303. Epub 2019 Feb 12. doi: 10.1063/1.5079407

Author

McGrath, Thomas ; Bagci, Ibrahim Ethem ; Wang, Zhiming et al. / A PUF Taxonomy. In: Applied Physics Reviews. 2019 ; Vol. 6, No. 1.

Bibtex

@article{882b635673b94a438adbf4c62c5720af,
title = "A PUF Taxonomy",
abstract = "Authentication is an essential cryptographic primitive that confirms the identity of parties during communications. For security, it is important that these identities are complex, in order to make them difficult to clone or guess. In recent years, physically unclonable functions (PUFs) have emerged, in which identities are embodied in structures, rather than stored in memory elements. PUFs provide {\textquoteleft}digital fingerprints{\textquoteright}, where information is usually read from the static entropy of a system, rather than having an identity artificially programmed in, preventing a malicious party from making a copy for nefarious use later on. Many concepts for the physical source of uniqueness of these PUFs have been developed for multiple different applications. While certain types of PUF have received a great deal of attention, other promising suggestions may be overlooked. To remedy this, we present a review that seeks to exhaustively catalogue and provide a complete organisational scheme towards the suggested concepts for PUFs. Furthermore, by carefully considering the physical mechanisms underpinning the operation of different PUFs, we are able to form relationships between PUF technologies that previously had not been linked, and look toward novel forms of PUF using physical principles that have yet to be exploited. ",
keywords = "Physical Unclonable Functions, PUF, Physical Security, Identification, Authentication",
author = "Thomas McGrath and Bagci, {Ibrahim Ethem} and Zhiming Wang and Utz Roedig and Young, {Robert James}",
year = "2019",
month = mar,
doi = "10.1063/1.5079407",
language = "English",
volume = "6",
journal = "Applied Physics Reviews",
issn = "1931-9401",
publisher = "American Institute of Physics Publising LLC",
number = "1",

}

RIS

TY - JOUR

T1 - A PUF Taxonomy

AU - McGrath, Thomas

AU - Bagci, Ibrahim Ethem

AU - Wang, Zhiming

AU - Roedig, Utz

AU - Young, Robert James

PY - 2019/3

Y1 - 2019/3

N2 - Authentication is an essential cryptographic primitive that confirms the identity of parties during communications. For security, it is important that these identities are complex, in order to make them difficult to clone or guess. In recent years, physically unclonable functions (PUFs) have emerged, in which identities are embodied in structures, rather than stored in memory elements. PUFs provide ‘digital fingerprints’, where information is usually read from the static entropy of a system, rather than having an identity artificially programmed in, preventing a malicious party from making a copy for nefarious use later on. Many concepts for the physical source of uniqueness of these PUFs have been developed for multiple different applications. While certain types of PUF have received a great deal of attention, other promising suggestions may be overlooked. To remedy this, we present a review that seeks to exhaustively catalogue and provide a complete organisational scheme towards the suggested concepts for PUFs. Furthermore, by carefully considering the physical mechanisms underpinning the operation of different PUFs, we are able to form relationships between PUF technologies that previously had not been linked, and look toward novel forms of PUF using physical principles that have yet to be exploited.

AB - Authentication is an essential cryptographic primitive that confirms the identity of parties during communications. For security, it is important that these identities are complex, in order to make them difficult to clone or guess. In recent years, physically unclonable functions (PUFs) have emerged, in which identities are embodied in structures, rather than stored in memory elements. PUFs provide ‘digital fingerprints’, where information is usually read from the static entropy of a system, rather than having an identity artificially programmed in, preventing a malicious party from making a copy for nefarious use later on. Many concepts for the physical source of uniqueness of these PUFs have been developed for multiple different applications. While certain types of PUF have received a great deal of attention, other promising suggestions may be overlooked. To remedy this, we present a review that seeks to exhaustively catalogue and provide a complete organisational scheme towards the suggested concepts for PUFs. Furthermore, by carefully considering the physical mechanisms underpinning the operation of different PUFs, we are able to form relationships between PUF technologies that previously had not been linked, and look toward novel forms of PUF using physical principles that have yet to be exploited.

KW - Physical Unclonable Functions

KW - PUF

KW - Physical Security

KW - Identification

KW - Authentication

U2 - 10.1063/1.5079407

DO - 10.1063/1.5079407

M3 - Journal article

VL - 6

JO - Applied Physics Reviews

JF - Applied Physics Reviews

SN - 1931-9401

IS - 1

M1 - 011303

ER -