• DocumentCode
    2256013
  • Title

    Hardware authentication based on PUFs and SHA-3 2nd round candidates

  • Author

    Eiroa, Susana ; Baturone, Iluminada

  • Author_Institution
    Depto. Electron. y Electromagnetismo, Univ. de Sevilla, Seville, Spain
  • fYear
    2010
  • fDate
    19-22 Dec. 2010
  • Firstpage
    319
  • Lastpage
    322
  • Abstract
    Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs.
  • Keywords
    cryptographic protocols; SHA-2 function; SHA-3; Xilinx FPGA; cryptographic protocols; hardware authentication; microelectronics; secure hash algorithm; security feature; symmetric-key authentication protocol; Authentication; Clocks; Cryptography; Field programmable gate arrays; Hardware; Protocols; Ring oscillators; Hash function; lightweight protocol; physically unclonable function; true random number generator;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Microelectronics (ICM), 2010 International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-61284-149-6
  • Type

    conf

  • DOI
    10.1109/ICM.2010.5696149
  • Filename
    5696149