21-10-2016, 10:04 AM
1460268345-PUFassign.rtf (Size: 2.63 KB / Downloads: 5)
Summary:
FPGA has been used for the implementation of different architechtures in different application areas like industrial, medical militry or any sort of security based application. For more secure architecture design FPGA has introduce PUF (Physical Unclonable Function). PUF provide us solution of more secure device based coding. It enable us for generating a electronic signature of the device. Instead of storing a key code for the program using PUF technique we can protect our code by generating PUF of that FPGA.
PUF is a physical behaviour of the FPGA on a certain voltage which gives us the advantage of generating code according to the behavior of the kit which is uniqe for every FPGA. There are two types of PUF we can generate one is baesd on dely of FPGA and other is memory based.
There are different schemes to generate PUF in these two types but we will discuss ring ocillator (RO) delay based PUF. Ring Ocillator (RO) is a technique in which we compare the frequencies of the ROs on hte bases of those frequencies generate an ouput signal. For that porpouse all the ROs in the kit has to be mutually symmetric and for the responce of the PUF the number of ROs should be small as for preserving the independence of bits.
Using this we willl be able to generate ouput bits of paired ROs of the FPGA and we can create more higher pair of ROs. this deisgn will lead us to the design of PUF through which can generate PUF output bits by select a prticular part of the counter value. To improve the statbility of the PUF, we will apply Gray code on the counter value.
By changing the input voltage we can analyze the change in ROPUF which is cased by the change in frequencies of the paired ROs.
From the other paper which was based on the solution of authentication of stable clocked platform. They have generated a PUF which is more stable clock operation.
Application area:
Since FPGA PUF is a newly emarging field which has vast area of research. PUF has different application areas such as it can be use in militry application where the operation is to be done thorugh some perticuler device and no other device can acess that.