Protection Profile for PUF-Based Devices

Abstract : Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique “fingerprint” of the IC, to enable generation of secrets or keys without storing sensitive data permanently in memory. Since PUFs are “noisy” functions, some kind of post processing is required to reliably reconstruct the respective PUF response. Based on potential threats and vulnerabilities as well as the security requirements for PUF-based tokens we developed a draft version of a Protection Profile according to Common Criteria. This paper discusses the central parts of this Protection Profile, namely the Target of Evaluation (TOE), PUF-specific security functional requirements (SFRs), and requirements on the operational environment regarding the whole life cycle of the TOE.
Type de document :
Communication dans un congrès
Nora Cuppens-Boulahia; Frédéric Cuppens; Sushil Jajodia; Anas Abou El Kalam; Thierry Sans. 29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. Springer, IFIP Advances in Information and Communication Technology, AICT-428, pp.91-98, 2014, ICT Systems Security and Privacy Protection. 〈10.1007/978-3-642-55415-5_8〉
Liste complète des métadonnées

Littérature citée [8 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01370357
Contributeur : Hal Ifip <>
Soumis le : jeudi 22 septembre 2016 - 14:18:13
Dernière modification le : jeudi 22 septembre 2016 - 15:15:44

Fichier

978-3-642-55415-5_8_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann. Protection Profile for PUF-Based Devices. Nora Cuppens-Boulahia; Frédéric Cuppens; Sushil Jajodia; Anas Abou El Kalam; Thierry Sans. 29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. Springer, IFIP Advances in Information and Communication Technology, AICT-428, pp.91-98, 2014, ICT Systems Security and Privacy Protection. 〈10.1007/978-3-642-55415-5_8〉. 〈hal-01370357〉

Partager

Métriques

Consultations de la notice

53

Téléchargements de fichiers

45