Next Article in Journal
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation
Next Article in Special Issue
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms
Previous Article in Journal
Random Number Generators: Principles and Applications
Previous Article in Special Issue
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis

by
Kusum Lata
1 and
Linga Reddy Cenkeramaddi
2,*
1
Department of Electronics and Communication Engineering, The LNM Institute of Information Technology, Jaipur 302031, India
2
Department of Information and Communication Technology, University of Agder, 4879 Grimstad, Norway
*
Author to whom correspondence should be addressed.
Cryptography 2023, 7(4), 55; https://doi.org/10.3390/cryptography7040055
Submission received: 27 September 2023 / Revised: 24 October 2023 / Accepted: 30 October 2023 / Published: 1 November 2023
(This article belongs to the Special Issue Feature Papers in Hardware Security II)

Abstract

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security make them an invaluable asset in this realm. This groundbreaking study not only dives deep into the universe of FPGA-based PUF designs but also offers a comprehensive overview coupled with a discerning comparative analysis. PUFs are the bedrock of device authentication and key generation and the fortification of secure cryptographic protocols. Unleashing the potential of FPGA technology expands the horizons of PUF integration across diverse hardware systems. We set out to understand the fundamental ideas behind PUF and how crucially important it is to current security paradigms. Different FPGA-based PUF solutions, including static, dynamic, and hybrid systems, are closely examined. Each design paradigm is painstakingly examined to reveal its special qualities, functional nuances, and weaknesses. We closely assess a variety of performance metrics, including those related to distinctiveness, reliability, and resilience against hostile threats. We compare various FPGA-based PUF systems against one another to expose their unique advantages and disadvantages. This study provides system designers and security professionals with the crucial information they need to choose the best PUF design for their particular applications. Our paper provides a comprehensive view of the functionality, security capabilities, and prospective applications of FPGA-based PUF systems. The depth of knowledge gained from this research advances the field of hardware security, enabling security practitioners, researchers, and designers to make wise decisions when deciding on and implementing FPGA-based PUF solutions.
Keywords: hardware security; physically unclonable functions (PUFs); PUF applications; field-programmable gate arrays (FPGAs); FPGA-based PUFs hardware security; physically unclonable functions (PUFs); PUF applications; field-programmable gate arrays (FPGAs); FPGA-based PUFs

Share and Cite

MDPI and ACS Style

Lata, K.; Cenkeramaddi, L.R. FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis. Cryptography 2023, 7, 55. https://doi.org/10.3390/cryptography7040055

AMA Style

Lata K, Cenkeramaddi LR. FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis. Cryptography. 2023; 7(4):55. https://doi.org/10.3390/cryptography7040055

Chicago/Turabian Style

Lata, Kusum, and Linga Reddy Cenkeramaddi. 2023. "FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis" Cryptography 7, no. 4: 55. https://doi.org/10.3390/cryptography7040055

APA Style

Lata, K., & Cenkeramaddi, L. R. (2023). FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis. Cryptography, 7(4), 55. https://doi.org/10.3390/cryptography7040055

Article Metrics

Back to TopTop