Repositorio de producción científica de la Universidad de Sevilla

Hardware authentication based on PUFs and SHA-3 2nd round candidates


Advanced Search
Opened Access Hardware authentication based on PUFs and SHA-3 2nd round candidates

Show item statistics
Export to
Author: Eiroa, Susana
Baturone Castillo, María Iluminada
Department: Universidad de Sevilla. Departamento de Electrónica y Electromagnetismo
Date: 2010
ISBN/ISSN: 978-1-61284-149-6
Document type: Presentation
Abstract: Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs.
Size: 197.0Kb
Format: PDF



This work is under a Creative Commons License: 
Attribution-NonCommercial-NoDerivatives 4.0 Internacional

This item appears in the following Collection(s)