$30 off During Our Annual Pro Sale. View Details »

Physical Unclonable Functions as Security Enablers

Physical Unclonable Functions as Security Enablers

Three minute talk on how Physical Unclonable Functions (PUFs) can act as security enablers in Machine-to-Machine (M2M) or Internet of Things (IoT) scenarios.
Presented in the TRUDEVICE Training School in April 2016 at Leukerbad, Switzerland.

Konstantinos Goutsos

April 18, 2016
Tweet

More Decks by Konstantinos Goutsos

Other Decks in Technology

Transcript

  1. Physical Unclonable Functions as Security Enablers Konstantinos Goutsos Newcastle University

    K.Goutsos1@newcastle.ac.uk April 18, 2016 Konstantinos Goutsos TRUDEVICE Training School, April 2016, Leukerbad, CH PUFs as security enablers 1 / 4
  2. Perspective Security is for people, not for machines Konstantinos Goutsos

    TRUDEVICE Training School, April 2016, Leukerbad, CH PUFs as security enablers 2 / 4
  3. Physical Unclonable Functions • Accept challenge and produce unique response

    • Based on intrinsic characteristics which are unclonable and difficult to model • Responses used as cryptographic keys, random numbers or unique identifiers • Offline attacks are impossible • Intrusive attacks would destroy the secret before exposing it Konstantinos Goutsos TRUDEVICE Training School, April 2016, Leukerbad, CH PUFs as security enablers 3 / 4
  4. Research Points Konstantinos Goutsos TRUDEVICE Training School, April 2016, Leukerbad,

    CH PUFs as security enablers 4 / 4