Physically Unclonable Functions (PUFs) are well-known to be
solutions for silicon-level anti-copy applications. However, as they are
sensitive components, they are the obvious target of physical attacks. Thus,
they shall be well protected. In this work we discuss the use case of key
generation with a Loop PUF. We discuss the Loop PUF's efficiency and
efficacy. We analyze it with respect to several known attacks like
side-channel and machine learning attacks, and show that in all considered
cases it either natively resists or can be protected. We also show that
perturbation attempts should be within the scope of likely attacks, hence
the PUF shall be protected against tampering attacks as well. Also for this
attack scenario we highlight the salient features of the Loop PUF and
explain how its mode of operation natively empowers it to resist such
attacks.
«
Physically Unclonable Functions (PUFs) are well-known to be
solutions for silicon-level anti-copy applications. However, as they are
sensitive components, they are the obvious target of physical attacks. Thus,
they shall be well protected. In this work we discuss the use case of key
generation with a Loop PUF. We discuss the Loop PUF's efficiency and
efficacy. We analyze it with respect to several known attacks like
side-channel and machine learning attacks, and show that in all considered...
»