{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:34Z","timestamp":1775228734043,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Physical Unclonable Functions (PUFs) are designed to extract physical randomness from the underlying silicon. This randomness depends on the manufacturing process. It differs for each device. This enables chip-level authentication and key generation applications. We present an encryption protocol using PUFs as primary encryption\/decryption functions. Each party has a PUF used for encryption and decryption. This PUF is constrained to be invertible and commutative. The focus of the paper is an evaluation of an invertible and commutative PUF based on a primitive shifting permutation network\u2014a barrel shifter. Barrel shifter (BS) PUF captures the delay of different shift paths. This delay is entangled with message bits before they are sent across an insecure channel. BS-PUF is implemented using transmission gates for physical commutativity. Post-layout simulations of a common centroid layout 8-level barrel shifter in 0.13    \u03bc   m technology assess uniqueness, stability, randomness and commutativity properties. BS-PUFs pass all selected NIST statistical randomness tests. Stability similar to Ring Oscillator (RO) PUFs under environmental variation is shown. Logistic regression of 100,000 plaintext\u2013ciphertext pairs (PCPs) fails to successfully model BS-PUF behavior.<\/jats:p>","DOI":"10.3390\/cryptography2030022","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T10:57:52Z","timestamp":1535713072000},"page":"22","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Barrel Shifter Physical Unclonable Function Based Encryption"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0316-5735","authenticated-orcid":false,"given":"Yunxi","family":"Guo","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011, USA"}]},{"given":"Timothy","family":"Dee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2101-3594","authenticated-orcid":false,"given":"Akhilesh","family":"Tyagi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"ref_1","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"Boneh","year":"1999","journal-title":"Not. AMS"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Yanambaka, V.P., Mohanty, S.P., Kougianos, E., and Singh, J. (2016, January 19\u201321). Secure Multi-Key Generation Using Ring Oscillator based Physical Unclonable Function. Proceedings of the 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India.","DOI":"10.1109\/iNIS.2016.053"},{"key":"ref_3","unstructured":"Chen, Q., Csaba, G., Ju, X., Natarajan, S., Lugli, P., Stutzmann, M., Schlichtmann, U., and R\u00fchrmair, U. (2009, January 14\u201316). Analog circuits for physical cryptography. Proceedings of the 2009 12th International Symposium on Integrated Circuits, Singapore."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Choi, W., Kim, S., Kim, Y., Park, Y., and Ahn, K. (July, January 29). PUF-based Encryption Processor for the RFID Systems. Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology, Bradford, UK.","DOI":"10.1109\/CIT.2010.400"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. (2008, January 16\u201317). Design and implementation of PUF-based \u201cunclonable\u201d RFID ICs for anti-counterfeiting and security applications. Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA.","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Che, W., Saqib, F., and Plusquellic, J. (2015, January 2\u20136). PUF-based authentication. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"ref_7","unstructured":"Urbi Chatterjee, R.S.C., and Mukhopadhyay, D. (2016). A PUF-Based Secure Communication Protocol for IoT, ACM. Available online: http:\/\/eprint.iacr.org\/2016\/674."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yanambaka, V.P., Mohanty, S.P., and Kougianos, E. (2016, January 19\u201321). Novel FinFET based physical unclonable functions for efficient security integration in the IoT. Proceedings of the 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India.","DOI":"10.1109\/iNIS.2016.047"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yanambaka, V.P., Mohanty, S.P., Kougianos, E., Sundaravadivel, P., and Singh, J. (2017, January 3\u20135). Reconfigurable Robust Hybrid Oscillator Arbiter PUF for IoT Security Based on DL-FET. Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Bochum, Germany.","DOI":"10.1109\/ISVLSI.2017.121"},{"key":"ref_10","first-page":"651","article-title":"Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption","volume":"2015","author":"Kleber","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_11","unstructured":"Daemen, J., and Rijmen, V. (2013). The Design of Rijndael: AES-the Advanced Encryption Standard, Springer."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","article-title":"Power-up SRAM state as an identifying fingerprint and source of true random numbers","volume":"58","author":"Holcomb","year":"2009","journal-title":"IEEE Trans. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Mansouri, S.S., and Dubrova, E. (October, January 30). Ring oscillator physical unclonable function with multi level supply voltages. Proceedings of the 2012 IEEE 30th International Conference on Computer Design (ICCD), Montreal, QC, Canada.","DOI":"10.1109\/ICCD.2012.6378703"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yin, C.E.D., and Qu, G. (2010, January 13\u201314). LISA: Maximizing RO PUF\u2019s secret extraction. Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA.","DOI":"10.1109\/HST.2010.5513105"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Maiti, A., and Schaumont, P. (September, January 31). Improving the quality of a physical unclonable function using configurable ring oscillators. Proceedings of the 2009 International Conference on Field Programmable Logic and Applications, Prague, Czech Republic.","DOI":"10.1109\/FPL.2009.5272361"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","article-title":"Improved ring oscillator PUF: An FPGA-friendly secure primitive","volume":"24","author":"Maiti","year":"2011","journal-title":"J. Cryptol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Hori, Y., Yoshida, T., Katashita, T., and Satoh, A. (2010, January 13\u201315). Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. Proceedings of the 2010 International Conference on Reconfigurable Computing and FPGAs, Quintana Roo, Mexico.","DOI":"10.1109\/ReConFig.2010.24"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tajik, S., Dietz, E., Frohmann, S., Seifert, J.P., Nedospasov, D., Helfmeier, C., Boit, C., and Dittrich, H. (2014, January 23\u201326). Physical characterization of arbiter PUFs. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Busan, Korea.","DOI":"10.1007\/978-3-662-44709-3_27"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1038\/scientificamerican0785-48","article-title":"The fundamental physical limits of computation","volume":"253","author":"Bennett","year":"1985","journal-title":"Sci. Am."},{"key":"ref_20","unstructured":"Bertoni, G., Daemen, J., Peeters, M., and Van Assche, G. (2016). The Keccak Sponge Function Family, Team Keccak. Technical Report."},{"key":"ref_21","unstructured":"Bertoni, G., Daemen, J., Peeters, M., and Van Assche, G. (2018, August 30). The Keccak Reference. Available online: https:\/\/keccak.team\/files\/Keccak-reference-3.0.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1023\/A:1011217615169","article-title":"Mismatch modeling and simulation? A comprehensive approach","volume":"29","author":"Oehm","year":"2001","journal-title":"Analog Integr. Circuits Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPOT.2015.2490261","article-title":"Everything You Wanted to Know about PUFs","volume":"36","author":"Joshi","year":"2017","journal-title":"IEEE Potentials"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gao, M., Lai, K., and Qu, G. (2014, January 1\u20135). A highly flexible ring oscillator PUF. Proceedings of the 51st Annual Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/2593069.2593072"},{"key":"ref_25","unstructured":"Yu, M.D.M., M\u2019Raihi, D., Sowell, R., and Devadas, S. (October, January 28). Lightweight and secure PUF key storage using limits of machine learning. Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bhargava, M., and Mai, K. (2014, January 24\u201328). An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS. Proceedings of the conference on Design, Automation & Test in Europe, Dresden, Germany.","DOI":"10.7873\/DATE.2014.083"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kumar, R., Chandrikakutty, H.K., and Kundu, S. (2011, January 5\u20136). On improving reliability of delay based Physically Unclonable Functions under temperature variations. Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, San Diego, CA, USA.","DOI":"10.1109\/HST.2011.5955012"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Vivekraja, V., and Nazhandali, L. (2011, January 2\u20137). Feedback based supply voltage control for temperature variation tolerant PUFs. Proceedings of the 2011 24th Internatioal Conference on VLSI Design, Chennai, India.","DOI":"10.1109\/VLSID.2011.60"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_30","unstructured":"Bishop, C.M. (2006). Pattern Recognition and Machine Learning, Springer."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Back, T. (1996). Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms, Oxford University Press.","DOI":"10.1093\/oso\/9780195099713.001.0001"},{"key":"ref_32","unstructured":"Schwefel, H.P.P. (1993). Evolution and Optimum Seeking: The Sixth Generation, John Wiley & Sons, Inc."},{"key":"ref_33","unstructured":"Robert, C.P. (2004). Monte Carlo Methods, Wiley Online Library."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/22\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:22:17Z","timestamp":1760196137000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,31]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["cryptography2030022"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2030022","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,31]]}}}