{"id":3966,"date":"2023-01-07T18:28:08","date_gmt":"2023-01-07T18:28:08","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3966"},"modified":"2023-07-10T14:07:48","modified_gmt":"2023-07-10T14:07:48","slug":"ch1_puf","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch1_puf\/","title":{"rendered":"Chapter 1: PUF"},"content":{"rendered":"\n<h2 class=\"is-style-subheading wp-block-heading\"><strong>Chapter 1<\/strong><\/h2>\n\n\n\n<h3 class=\"is-style-subheading wp-block-heading\" style=\"font-style:normal;font-weight:100\">Physical Unclonable Functions (PUFs)<\/h3>\n\n\n\n<p>A physical unclonable function (PUF) is a circuit that exploits inherent randomness introduced during manufacturing to give a physical object a unique and unclonable \u2018fingerprint\u2019 or root-of-trust.<strong> <\/strong>Among other uses, PUFs enable secret key generation, device authentication, intellectual property (IP) protection, and trusted computing. In this chapter, we demonstrated how to implement a ring oscillator (RO) based PUF instance and analyze it on a field programmable gate array (FPGA) device. Also, this chapter provides a basic understanding of RO-PUF design techniques in FPGAs and shows how to collect challenge-response pairs (CRPs) and apply appropriate constraints to compose a PUF architecture based on performance and calculate metrics evaluation.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/Chapter01_PUF.zip\">Download Chapter files<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chapter 1 Physical Unclonable Functions (PUFs) A physical unclonable function (PUF) is a circuit that exploits inherent randomness introduced during manufacturing to give a physical object a unique and unclonable \u2018fingerprint\u2019 or root-of-trust. Among other uses, PUFs enable secret key generation, device authentication, intellectual property (IP) protection, and trusted computing. In this chapter, we demonstrated &hellip;<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3964,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3966"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3966"}],"version-history":[{"count":11,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3966\/revisions"}],"predecessor-version":[{"id":4607,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3966\/revisions\/4607"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}