Frequently Asked Questions
General PUF Questions
Depending on the architecture, there are also many other uses for a PUF. The other applications for exponential PUFs include:
- authentication
- anti-counterfeiting
- true random number generation
This exposes the device to three large risks: (1) the ability for a bad actor to steal the key during the design and/or manufacturing process, (2) the ability for a bad actor to hack the hardware and find where the key is stored, or (3) the ability for a bad actor to hack the design source of the product and steal the key.
In contrast, with a PUF the unique signature is created during the manufacturing process using tiny manufacturing discrepancies. No designer or manufacturer is aware of what the unique signature or key is. Secondly, the “key” is not physically stored in the hardware, so it’s not hackable in the same ways as common cryptographic keys.
Linear PUFs, like an SRAM PUF, can only provide a limited number of keys at limited sizes; many SRAM PUFs only offer one key per PUF at a limited key size.
Exponential PUFs, like GMT’s Giga-PUF, can provide a nearly limitless number of keys at nearly any size of each key, all on a single PUF.
The likelihood of a successful attack on a PUF depends in large part on the number of data bits available for the generation of the unique signature of the PUF. The more security data bits available, the more secure the signature from all types of attacks.
The most common PUF architectures today are memory-based. Memory PUFs, like the SRAM PUF, are linear PUFs. Linear PUFs have a limited number of data bits available for securing the unique signature. Thus, in most cases SRAM PUFs are heavily wrapped in additional cryptographic algorithms to ensure that attackers can’t access the unique signature.
Logic-based architectures, like the Giga-PUF, are exponential in nature. This gives them an exponential number of data bits available for securing the unique signature, making them significantly less reliant on additional cryptographic algorithms, and making them overall more secure, and natively resistant to all types of attacks. Further, the exponential space makes it nearly impossible for a malicious observer to characterize and predict PUF responses.
- An exponentially large number of entropy bits makes the PUF incredibly secure. So secure, that it makes characterization of the entire bit space impossible, and makes it natively resistant to attacks, including machine learning attacks.
- An exponentially large number of entropy bits relieves the need for heavy cryptographic algorithmic support, like is needed for linear PUFs.
- An exponentially large number of entropy bits creates versatility in applications, allowing a PUF to be used for more than just a drop-in replacement for cryptographic keys.
Most linear PUF providers combat this risk through additional heavy cryptographic algorithmic support around the PUF. This adds significant compute, area, and power resources, but does secure the PUF better than it otherwise would be.
The most common instantiation of the linear PUF is the SRAM PUF.
What makes one PUF better than another depends on the type of PUF and its versatility in application. Typically, exponential PUFs are better than linear PUFs, as they are more secure, have much higher diversity in application, use less area and less power, and are less reliant on cryptographic algorithmic support.
Further, metrics such as stability, uniqueness, and uniformity help measure the quality of a PUF.
(1) Stability. Stability is the most important metric for a PUF, as it measures a PUFs ability to produce the expected outcome when queried. The stableness of a data bit can erode due to various factors. If data bits become unstable, the unique signature of a PUF can be compromised. Thus, it is important to make sure that a PUF has very high stability, and is also why most companies offering commercial PUFs have some form of error correction software or technology to ensure stable results. The optimal stability for a PUF is 100%.
(2) Uniqueness. Uniqueness measures the ability of a PUF to uniquely distinguish a particular physical copy of the PUF from others of the same type. Ideally, every PUF should be unique, and the closer the results are to full uniqueness of each individual PUF, the better the results. Uniqueness is measured by the average hamming distance between response of a pair of PUFs to the same challenge, and the ideal value would be 50%, meaning given a large data space half of the bits will differ between any two PUFs.
(3) Uniformity. Uniformity measures the randomness of responses of a PUF. It estimates the balance between 1’s and 0’s in responses to a PUF challenge. The more random, the better. The ideal value for uniformity is 50%, which would be represented as half the data bits being a 1 and the other half being a 0.
When compared to exponential PUFs, linear PUFs tend to use (1) more compute resources due to a larger amount of supporting cryptographic algorithms, (2) larger area due to more hardened IP components and memory cell usage, and (3) larger operational power due to the (1) and (2) above.
For enrollment and authentication, a server issues challenges to a device in the form of a bitstream, and the device uses the manufacturing variances of the device to return a response. As long as the response matches the expected response to any given challenge, the device is authenticated. For an overview of this process with pictures, please review the Giga-ID page here.
GMT's Giga-PUF Questions
- Much more secure, with an exponentially large number of data bits
- Synthesizable, delivered as soft IP at any technology node and foundry
- Natively resistant to machine learning attacks
- Versatile, enables additional applications beyond use as a unique key
- Key flexibility, enabling a large amount of keys at various sizes
- Smaller circuit area, power, and compute resources over competing solutions
- Unique signature and key generation
- Enrollment and authentication
- True random number generation
- Anti-counterfeiting
There are two core products GMT offers: the Giga-Key, which provides unique signature and key generation, and the Giga-ID, which provides enrollment and authentication as well as anti-counterfeiting.
Customers can also elect to add to their PUF a true random number generator, that is compatible with both Giga products and included for a small additional cost.
Giga-Key PUF Questions
It is also much more secure and much more versatile than competing PUF solutions based on memory components.
Giga-ID PUF Questions
The Giga-ID is also used as an anti-counterfeiting product, validating the authenticity of a product.
Get Started Today
Interested in what GMT’s Physical Unclonable Function technology can do to help secure your IC? Contact GMT today to start your PUF implementation to outpace the competition.
Additional Resources
Learn More About the Giga-PUF