Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.5.075

Implementation of Physical Unclonable Function(PUF) using Transmission Line Crosstalks  

Lee, Kwan-Hee (College of Electrical and Computer Engineering Chungbuk National University)
Kim, Seung-Youl (College of Electrical and Computer Engineering Chungbuk National University)
Cho, Kyoungrok (College of Electrical and Computer Engineering Chungbuk National University)
You, Younggap (College of Electrical and Computer Engineering Chungbuk National University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.5, 2013 , pp. 75-82 More about this Journal
Abstract
This paper presents a PUF circuit based on the randomness of crosstalk magnitudes in adjacent transmission lines. Conventional PUF circuitry suffers the reliability problem where a consistent output value is not guaranteed due to environmental changes, such as power supply voltage and operating temperature. The proposed circuit consists of three transmission lines. The crosstalk difference between two transmission line pairs can be arbitrary. The proposed circuit compares the crosstalk differences between two transmission line pairs, and yields consistent responses. The crosstalk differences are immune to operating environment changes. The proposed PUF circuit provides with reliable responses for given challenges. It can be utilized by security systems such as authentication and encryption.
Keywords
crosstalk; PUF; Physical unclonable function;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 N. H. E. Weste and D. Harris, Principle of CMOS VLSI design: A system perspective, Addison Wesley, 2005.
2 K. G. Verma, B. K. Kaushik, R. Singh "Effects of process variation in VLSI interconnects - a technical review," Microelectronics International, vol. 26, pp. 49-55, 2009.   DOI   ScienceOn
3 G. E. Suh, S. Devadas, "Physical unclonable functions for device authentication and secret key generation," ACM/IEEE 2007, pp. 9-14, Jun. 2007.
4 J. W. Lee, L. Daihyun, B. Gassend, G. E. Suh, M. van Dijk and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications," IEEE VLSI Circuits Symposium, pp. 176-179, Jun. 2004.
5 J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Physical unclonable functions and public-key crypto for FPGA IP protection," FPL 2007, pp. 189-195, Aug. 2007.
6 P. Lugli, A. Mahmoud, G. Csaba, M. Algasinger, M. Stutzmann and U. Ruhrmair, "Physical unclonable functions based on crossbar arrays for cryptographic applications," International journal of circuit theory and applications, 2012.
7 T. H. Kim, D. C. Kim and Y. S. Eo, "Signal transient and crosstalk model of capacitively and inductively coupled VLSI interconnect lines," JSTS, vol. 7, no. 4, pp. 260-266, Dec. 2007.   DOI
8 N. Meijs and J. T. Fokkema, "VLSI circuit reconstruction from mask topology," Integration, vol. 2, no. 2, pp. 85-119, 1984.   DOI
9 L. R. Zheng, D. Pamunuwa and H. Tenhunen, "Accurate a priori signal integrity estimation using a dynamic interconnect model for deep submicron VLSI design," ESSCIRC, pp. 324-327, sep. 2000.
10 E. B. Rosa and F. W. Grover, Formulas and tables for the calculation of mutual and self-inductance, Washington Government Printing Office, 1916.
11 J. E. Lorival, D. Deschacht, Y. Quere, T. L. Gouguec and F. Huret, "Additivity of capacitive and inductive coupling in submicronic interconnects," IEEE DTIS, pp. 300-304, 2006.
12 S. H. Hall, G. W. Hall and J. A. McCall, High-speed digital system design, John Wiley & Sons New York, pp. 48, 2000.