Academy & Industry Research Collaboration Center (AIRCC)

Volume 10, Number 03, March 2020

Performance Evaluation of Prince based Glitch PUF With Several Selection Parts

  Authors

Yusuke Nozaki and Masaya Yoshikawa, Meijo University, Japan

  Abstract

To enhance the internet of things (IoT) security, lightweight ciphers and physically unclonable functions (PUFs) have attracted attention. Unlike standard encryption AES, lightweight ciphers can be implemented on embedded devices with strict constraints used in IoT. The PUF is a technology extracting manufacturing variations in LSI as device's unique ID. Since manufacturing variations cannot be cloned physically, the generated ID using PUF can be used for device's authentication. Actually, a method combining lightweight cipher (PRINCE) and PUF (glitch PUF) called PRINCE based glitch PUF has been proposed in recent years. However, PRINCE based glitch PUF was not optimized for PUF performances. Therefore, this study evaluates the detailed PUF performance of PRINCE based glitch PUF with changing the parameters. Experimental results using FPGAs clarified that PRINCE based glitch PUF had the relationship of trade-off between steadiness and uniqueness depending on the selected part as glitch generator.

  Keywords

Hardware Security, Physically Unclonable Function, Glitch PUF, PRINCE, Lightweight Cipher