This project presents the design, implementation, evaluation, and ASIC synthesis of a Hybrid XOR-Based Arbiter Physical Unclonable Function (PUF) for secure hardware authentication.
The system leverages intrinsic silicon manufacturing variations to generate unique, device-specific digital fingerprints, eliminating the need for stored cryptographic keys.
The proposed architecture is:
- โ Implemented on Basys-3 FPGA (Xilinx Artix-7)
- โ Evaluated using statistical performance metrics
- โ Integrated with UART-based challengeโresponse protocol
- โ Synthesized for ASIC (180nm CMOS) using Cadence Genus
- โ Designed for IoT and resource-constrained systems
A Physical Unclonable Function (PUF) is a hardware security primitive that generates unique responses based on uncontrollable manufacturing variations in integrated circuits.
For a given challenge:
- Same device โ Same response
- Different device โ Different response
This property makes PUFs ideal for:
- Device authentication
- Secure key generation
- Hardware root-of-trust
- Anti-counterfeiting systems
This project implements and evaluates multiple PUF variants:
- Basic Arbiter PUF
- XOR Arbiter PUF
- 16-Bit XOR Arbiter PUF
- MUXโDEMUX Arbiter PUF
- Proposed Hybrid Architecture (Improved Reliability)
- 16-bit challenge input
- 8 parallel Arbiter chains
- XOR-combined final response
- Modular design
- UART interface (9600 baud)
Standard Arbiter PUF is linear and vulnerable to machine learning attacks.
XOR-based architecture:
- Introduces non-linearity
- Improves entropy
- Enhances unpredictability
- Increases resistance to modeling attacks
Trade-off:
- Slight reliability reduction under environmental variation.
- 256 challenges applied
- CRPs collected via UART
- Stored in CSV database
- Reference fingerprint created
- Same 256 challenges re-applied
- Responses compared
- Match threshold: โฅ 240 / 256
If threshold satisfied โ โ Authenticated Else โ โ Authentication Failed
This threshold accounts for environmental noise and voltage variation.
Performance is evaluated using:
- Uniformity
- Uniqueness (HDinter)
- Randomness (Entropy)
- Reliability (HDintra)
| Architecture | Uniformity | Uniqueness | Randomness |
|---|---|---|---|
| Arbiter PUF | 99.4% | 0% | 67% |
| XOR PUF | 98.8% | 30.21% | 44.21% |
| 16-Bit XOR PUF | 98.8% | 35.44% | 49.5% |
- XOR improves uniqueness significantly.
- Hybrid design improves statistical balance.
- Reliability depends on delay margin stability.
Hardware validation of PUF architecture on Basys-3 FPGA board.
Performance of the implemented PUF architectures is evaluated using four primary metrics:
- Uniformity
- Uniqueness (HDinter)
- Randomness (Entropy)
- Reliability (HDintra)
Uniformity measures the balance between 0s and 1s in the response bits.
Ideal Value โ 50%
If the response is biased toward 0 or 1, the PUF becomes predictable.
[ Uniformity_a = \frac{1}{n} \sum_{b=1}^{n} r_{a,b} \times 100% ]
Where:
- ( n ) = number of response bits
- ( r_{a,b} ) = b-th bit of response from chip a
Interpretation:
- 50% โ Perfect balance
-
50% or <50% โ Bias present
Uniqueness evaluates how different responses are between different chips when the same challenge is applied.
Ideal Value โ 50%
[ Uniqueness = \frac{2}{k(k-1)} \sum_{a=1}^{k-1} \sum_{b=a+1}^{k} \frac{HD(Q_a, Q_b)}{n} \times 100% ]
Where:
- ( k ) = number of chips
- ( Q_a, Q_b ) = n-bit responses of chip a and b
- ( HD(Q_a, Q_b) ) = Hamming Distance
- ( n ) = number of response bits
Interpretation:
- 50% โ Perfect uniqueness
- <50% โ Devices too similar
-
50% โ Excessive variation
Randomness measures unpredictability of PUF responses.
High entropy means responses cannot be predicted.
[ H_n = -\log_2 \left( \max(p_n, 1 - p_n) \right) ]
Where:
- ( p_n ) = probability of occurrence of bit โ1โ
- ( 1 - p_n ) = probability of bit โ0โ
Interpretation:
- Maximum entropy when ( p_n = 0.5 )
- Lower entropy indicates bias
Reliability measures consistency of the same device under environmental variations (temperature, voltage).
Ideal Value โ 100%
[ HD_{INTRA_i} = \frac{1}{s} \sum_{t=1}^{s} \frac{HD(Q_i, Q_{i,t})}{n} \times 100% ]
Where:
- ( Q_i ) = reference response
- ( Q_{i,t} ) = response under variation
- ( s ) = number of measurements
- ( n ) = number of bits
[ Reliability_i = 100% - HD_{INTRA_i} ]
Interpretation:
- 100% โ Perfect stability
- Lower value โ Bit flips occurring
| Metric | Ideal Value |
|---|---|
| Uniformity | 50% |
| Uniqueness | 50% |
| Randomness | Maximum entropy |
| Reliability | 100% |
- Node: 180nm CMOS
- Tool: Cadence Genus
- Standard Cell Library: tsl18fs120
- Timing Corner: Slow-Slow (SS)
RTL โ Elaboration โ Generic Synthesis โ Mapping โ Optimization โ Netlist โ SDF โ Reports
| FPGA | ASIC |
|---|---|
| Reconfigurable | Permanent layout |
| Higher static power | Lower leakage |
| Bitstream attack risk | Physically fixed |
| Prototype-friendly | Production secure |
ASIC provides stronger unclonability and power efficiency for IoT deployment.
(Add synthesis report summary here:)
- Total Area
- Gate Count
- Leakage Power
- Dynamic Power
- Timing Slack
/rtl
arbiter_stage.v
arbiter_cell.v
xor_puf.v
top_module.v
/uart
uart_tx.v
uart_rx.v
/synthesis
genus_script.tcl
constraints.sdc
/results
performance_metrics.xlsx
synthesis_reports/
/docs
PUF_Final_Report.pdf
- No secret key storage
- Hardware-based device fingerprint
- Resistant to cloning
- XOR-based non-linearity
- Threshold-based authentication robustness
- ASIC-level physical immutability
- Environmental sensitivity (temperature/voltage)
- XOR increases delay instability
- CRP exposure may enable ML modeling
- No integrated ECC yet
- Error Correction Code (ECC) integration
- Machine learning attack evaluation
- Strong PUF enhancement
- On-chip key extraction module
- Low-power ASIC optimization
- Full tape-out ready design