{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T14:13:00Z","timestamp":1768831980301,"version":"3.49.0"},"reference-count":35,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The magnitude of the information content associated with a particular implementation of a Physical Unclonable Function (PUF) is critically important for security and trust in emerging Internet of Things (IoT) applications. Authentication, in particular, requires the PUF to produce a very large number of challenge-response-pairs (CRPs) and, of even greater importance, requires the PUF to be resistant to adversarial attacks that attempt to model and clone the PUF (model-building attacks). Entropy is critically important to the model-building resistance of the PUF. A variety of metrics have been proposed for reporting Entropy, each measuring the randomness of information embedded within PUF-generated bitstrings. In this paper, we report the Entropy, MinEntropy, conditional MinEntropy, Interchip hamming distance and National Institute of Standards and Technology (NIST) statistical test results using bitstrings generated by a Hardware-Embedded Delay PUF called HELP. The bitstrings are generated from data collected in hardware experiments on 500 copies of HELP implemented on a set of Xilinx Zynq 7020 SoC Field Programmable Gate Arrays (FPGAs) subjected to industrial-level temperature and voltage conditions. Special test cases are constructed which purposely create worst case correlations for bitstring generation. Our results show that the processes proposed within HELP to generate bitstrings add significantly to their Entropy, and show that classical re-use of PUF components, e.g., path delays, does not result in large Entropy losses commonly reported for other PUF architectures.<\/jats:p>","DOI":"10.3390\/cryptography1010008","type":"journal-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T10:01:20Z","timestamp":1496829680000},"page":"8","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Analysis of Entropy in a Hardware-Embedded Delay PUF"],"prefix":"10.3390","volume":"1","author":[{"given":"Wenjie","family":"Che","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]},{"given":"Venkata","family":"Kajuluri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]},{"given":"Mitchell","family":"Martin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]},{"given":"Fareena","family":"Saqib","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida Institute of Technology, Melbourne, FL 32901, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1876-117X","authenticated-orcid":false,"given":"Jim","family":"Plusquellic","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]}],"member":"1968","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Che, W., Martin, M., Pocklassery, G., Kajuluri, V.K., Saqib, F., and Plusquellic, J. (2017). A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. Cryptography, 1.","DOI":"10.3390\/cryptography1010003"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 9\u201313). Controlled Physical Random Functions. Proceedings of the Conference on Computer Security Applications, Washington, DC, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., and Devadas, S. (2002, January 18\u201322). Silicon Physical Unknown Functions. Proceedings of the Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_4","unstructured":"Lofstrom, K., Daasch, W.R., and Taylor, D. (2000, January 31). Identification Circuits using Device Mismatch. Proceedings of the International Solid State Circuits Conference, Piscataway, NJ, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Maiti, A., and Schaumont, P. (September, January 31). Improving the quality of a Physical Unclonable Function using Configurable Ring Oscillators. Proceedings of the 2009 International Conference on Field Programmable Logic and Applications, Prague, Czech Republic.","DOI":"10.1109\/FPL.2009.5272361"},{"key":"ref_6","unstructured":"Meng-Day, Y., Sowell, R., Singh, A., M\u2019Raihi, D., and Devadas, S. (2012, January 3\u20134). Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC. Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA."},{"key":"ref_7","first-page":"10","article-title":"Offline Hardware\/Software Authentication for Reconfigurable Platforms","volume":"4249","author":"Simpson","year":"2006","journal-title":"Cryptogr. Hardw. Embed. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Habib, B., Gaj, K., and Kaps, J.-P. (2013, January 4\u20136). FPGA PUF Based on Programmable LUT Delays. Proceedings of the Euromicro Conference on Digital System Design, Santander, Spain.","DOI":"10.1109\/DSD.2013.79"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G., and Tuyls, P. (2008, January 18\u201321). Brand and IP Protection with Physical Unclonable Functions. Proceedings of the Symposium on Circuits and Systems, Seattle, WA, USA.","DOI":"10.1109\/ISCAS.2008.4542135"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Alkabani, Y., Koushanfar, F., Kiyavash, N., and Potkonjak, M. (2008, January 19\u201321). Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Proceedings of the 10th International WorkshopInformation Hiding, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-540-88961-8_8"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Helinski, R., Acharyya, D., and Plusquellic, J. (2009, January 26\u201331). Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations. Proceedings of the Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/1629911.1630089"},{"key":"ref_12","unstructured":"Chakraborty, R., Lamech, C., Acharyya, D., and Plusquellic, J. (June, January 29). A Transmission Gate Physical Unclonable Function and On-Chip Voltage-to-Digital Conversion Technique. Proceedings of the Design Automation Conference, Austin, TX, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Aarestad, J., Plusquellic, J., and Acharyya, D. (2013, January 2\u20133). Error-Tolerant Bit Generation Techniques for Use with a Hardware-Embedded Path Delay PUF. Proceedings of the Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA.","DOI":"10.1109\/HST.2013.6581581"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/iet-cdt.2014.0042","article-title":"An ASIC Implementation of a Hardware-Embedded Physical Unclonable Function","volume":"8","author":"Saqib","year":"2014","journal-title":"IET Comput. Digit. Tech."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Che, W., Saqib, F., and Plusquellic, J. (2015, January 2\u20136). PUF-Based Authentication. Proceedings of the 2015 IEEE\/ACM International Conference on ICCAD, Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rose, G.S., McDonald, N., Lok-Kwong, Y., Wysocki, B., and Xu, K. (2013, January 15\u201317). Foundations of Memristor Based PUF Architectures. Proceedings of the International Symposium on Nanoscale Architectures, Brooklyn, NY, USA.","DOI":"10.1109\/NanoArch.2013.6623044"},{"key":"ref_17","unstructured":"Yu, Z., Krishna, A.R., and Bhunia, S. (2013, January 22\u201325). ScanPUF: Robust Ultralow-Overhead PUF using Scan Chain. Proceedings of the Asia and South Pacific Design Automation Conference, Yokohama, Japan."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Konigsmark, S.T.C., Hwang, L.K., Deming, C., and Wong, M.D.F. (2014, January 20\u201323). CNPUF: A Carbon Nanotubebased Physically Unclonable Function for Secure Low-Energy Hardware Design. Proceedings of the Asia and South Pacific Design Automation Conference, Singapore.","DOI":"10.1109\/ASPDAC.2014.6742869"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., and Devadas, S. (2010, January 12\u201315). FPGA PUF using Programmable Delay Lines. Proceedings of the Workshop on Information Forensics and Security, Seattle, WA, USA.","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hori, Y., Yoshida, T., and Katashita, T. (2010, January 13\u201315). Satoh Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs. Proceedings of the Conference on Reconfigurable Computing and FPGAs, Cancun, Mexico.","DOI":"10.1109\/ReConFig.2010.24"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1002\/cpe.805","article-title":"Identification and Authentication of Integrated Circuits","volume":"16","author":"Gassend","year":"2014","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_22","unstructured":"Xin, X., Kaps, J., and Gaj, K. (September, January 31). A Configurable Ring-Oscillator-Based PUF for Xilinx FPGAs. Proceedings of the Conference on Digital System Design, Oulu, Finland."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Suh, E., and Devadas, S. (2007, January 4\u20138). Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","article-title":"A Robust Physical Unclonable Function with Enhanced Challenge-Response Set","volume":"7","author":"Maiti","year":"2012","journal-title":"Trans. Inf. Forensics Secur."},{"key":"ref_25","unstructured":"Chi, E., Yin, D., and Qu, G. (2010, January 13\u201314). LISA: Maximizing RO PUF\u2019s Secret Extraction. Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA."},{"key":"ref_26","unstructured":"Chi, E., Yin, D., and Qu, G. (June, January 29). Improving PUF Security with Regression-based Distiller. Proceedings of the Design Automation Conference, Austin, TX, USA."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","article-title":"Helper Data Algorithms for PUF-based key generation: Overview and analysis","volume":"34","author":"Delvaux","year":"2015","journal-title":"Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_28","first-page":"181","article-title":"Efficient Helper Data Key Extractor on FPGAs","volume":"5154","author":"Bosch","year":"2008","journal-title":"Workshop Cryptogr. Hardw. Embed. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Li, J., Rajan, A., and Wu, W. (2014, January 6\u20137). Entropy Loss in PUF-based Key Generation Schemes: The Repetition Code Pitfall. Proceedings of the Symposium on Hardware-Oriented Security and Trust, Arlington, VA, USA.","DOI":"10.1109\/HST.2014.6855566"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Kocabas, \u00dc., Rozic, V., Sadeghi, A.-R., Verbauwhede, I., and Wachsmann, C. (2012, January 9\u201312). PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. Proceedings of the 14th international conference on Cryptographic Hardware and Embedded System, Leuven, Belgium.","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"ref_32","unstructured":"Tiri, K., and Verbauwhede, I. (2004, January 16\u201320). A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. Proceedings of the Design, Automation and Test in Europe Conference and Exhibition, Paris, France."},{"key":"ref_33","unstructured":"Claes, M., van der Leest, V., and Braeken, A. (November, January 31). Comparison of SRAM and FF PUF in 65 nm Technology. Proceedings of the Nordic Conference on Secure IT Systems, Karlskrona, Sweden."},{"key":"ref_34","unstructured":"(2017, January 01). National Institute of Standards and Technology, Available online: http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documentation_software.html."},{"key":"ref_35","unstructured":"(2017, January 01). Pearson Correlation Coefficient, Wikipedia. Available online: https:\/\/en.wikipedia.org\/wiki\/Pearson_correlation_coefficient."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/1\/8\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:38:18Z","timestamp":1760207898000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["cryptography1010008"],"URL":"https:\/\/doi.org\/10.3390\/cryptography1010008","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,7]]}}}