Performance Evaluation of Prince Based Glitch PUF With Several Selection Parts presented at CNSA 2020

by Yusuke Yoshikawa,

Summary : To enhance the internet of things (IoT) security, lightweight ciphers and physically unclonable functions (PUFs) have attracted attention. Unlike standard encryption AES, lightweight ciphers can be implemented on embedded devices with strict constraints used in IoT. The PUF is a technology extracting manufacturing variations in LSI as device's unique ID. Since the manufacturing variation cannot be cloned physically, the generated ID using PUF can be used for device's authentication. Actually, a method combining lightweight cipher (PRINCE) and PUF (glitch PUF) called PRINCE based glitch PUF has been proposed in recent years. However, PRINCE based glitch PUF was not optimized for PUF performance. Therefore, this study evaluates the detailed PUF performance of PRINCE based glitch PUF with changing the parameters. Experiments using a field programmable gate array verify the PUF performance of the PRINCE based glitch PUF with several parameters.