Slide 3
Slide 3 text
Physical Unclonable Functions
• Accept challenge and produce unique response
• Based on intrinsic characteristics which are
unclonable and difficult to model
• Responses used as cryptographic keys, random
numbers or unique identifiers
• Offline attacks are impossible
• Intrusive attacks would destroy the secret before
exposing it
Konstantinos Goutsos TRUDEVICE Training School, April 2016, Leukerbad, CH PUFs as security enablers 3 / 4