Protection Profile for PUF-Based Devices - ICT Systems Security and Privacy Protection (SEC 2014) Access content directly
Conference Papers Year : 2014

Protection Profile for PUF-Based Devices

Verena Brunner
  • Function : Author
  • PersonId : 989374
Martin Deutschmann
  • Function : Author


Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique “fingerprint” of the IC, to enable generation of secrets or keys without storing sensitive data permanently in memory. Since PUFs are “noisy” functions, some kind of post processing is required to reliably reconstruct the respective PUF response. Based on potential threats and vulnerabilities as well as the security requirements for PUF-based tokens we developed a draft version of a Protection Profile according to Common Criteria. This paper discusses the central parts of this Protection Profile, namely the Target of Evaluation (TOE), PUF-specific security functional requirements (SFRs), and requirements on the operational environment regarding the whole life cycle of the TOE.
Fichier principal
Vignette du fichier
978-3-642-55415-5_8_Chapter.pdf (4 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01370357 , version 1 (22-09-2016)





Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann. Protection Profile for PUF-Based Devices. 29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.91-98, ⟨10.1007/978-3-642-55415-5_8⟩. ⟨hal-01370357⟩
206 View
166 Download



Gmail Facebook X LinkedIn More