Title :
Hardware authentication based on PUFs and SHA-3 2nd round candidates
Author :
Eiroa, Susana ; Baturone, Iluminada
Author_Institution :
Depto. Electron. y Electromagnetismo, Univ. de Sevilla, Seville, Spain
Abstract :
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs.
Keywords :
cryptographic protocols; SHA-2 function; SHA-3; Xilinx FPGA; cryptographic protocols; hardware authentication; microelectronics; secure hash algorithm; security feature; symmetric-key authentication protocol; Authentication; Clocks; Cryptography; Field programmable gate arrays; Hardware; Protocols; Ring oscillators; Hash function; lightweight protocol; physically unclonable function; true random number generator;
Conference_Titel :
Microelectronics (ICM), 2010 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-61284-149-6
DOI :
10.1109/ICM.2010.5696149