Hi Samita, Hannes, et al:
I gave a presentation on physically unclonable functions at NIST key management workshop 5 years ago (see [1]), which explains the main concepts. Please note that the "unique device property" is lost as soon as the PUF f or a deterministically-derived key K=H(f) is exposed (see Slide 6 -- hence, the color coding in "red", not to be exposed material). One needs to do extra tricks, i.e., design a challenge-response protocol that witnesses possession of f without revealing this, to use this for ongoing authentication. There are ways to do this, though. Best regards, Rene [1] R. Struik, “Secure Key Storage and True Random Number Generation,” presented at NIST-KMW: NIST Cryptographic Key Management Workshop, Gaithersburg, MD, September 10-11, 2012 Available from https://csrc.nist.gov/csrc/media/events/cryptographic-key-management-workshop-2012/documents/struik_nist_kmw_2012.pdf On 11/6/2017 11:21 PM, Samita Chakrabarti wrote:
-- email: rstruik.ext@xxxxxxxxx | Skype: rstruik cell: +1 (647) 867-5658 | US: +1 (415) 690-7363 |