201. Hardware authentication based on PUFs and SHA-3 2nd round candidates
- Author
-
Eiroa, Susana, Baturone Castillo, María Iluminada, and Universidad de Sevilla. Departamento de Electrónica y Electromagnetismo
- Subjects
Physically unclonable function ,True random number generator ,Hash function ,Lightweight protocol - Abstract
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs. Junta de Andalucía P08-TIC-03674 Comunidad Europea FP7-INFSO-ICT-248858 Ministerio de Ciencia y Tecnología TEC2008-04920 y DPI2008-03847
- Published
- 2010