Published March 24, 2017 | Version v1
Publication

Hardware authentication based on PUFs and SHA-3 2nd round candidates

Description

Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs.

Abstract

Junta de Andalucía P08-TIC-03674

Abstract

Comunidad Europea FP7-INFSO-ICT-248858

Abstract

Ministerio de Ciencia y Tecnología TEC2008-04920 y DPI2008-03847

Additional details

Created:
March 25, 2023
Modified:
December 1, 2023