{"id":737,"date":"2020-06-15T14:02:21","date_gmt":"2020-06-15T14:02:21","guid":{"rendered":"https:\/\/blog.pufsecurity.com\/?p=737"},"modified":"2023-11-30T03:14:16","modified_gmt":"2023-11-30T03:14:16","slug":"neopuf-a-reliable-and-non-traceable-quantum-tunneling-puf","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hant\/document\/neopuf-a-reliable-and-non-traceable-quantum-tunneling-puf\/","title":{"rendered":"PUF Series 2: NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF"},"content":{"rendered":"\n

<\/p>\n\n\n\n

PUF stands for \u201cPhysically Unclonable Function\u201d and is a physically derived \u201cfingerprint\u201d that serves as a unique identity for semiconductor devices. Their properties depend on the uniqueness and randomness of the physical factors induced during the manufacturing stage of a chip. These physical variations are unpredictable and unclonable; that\u2019s why PUFs are suitable to serve as a root of trust with security functions in devices. In practice, we could transfer those microvariations of PUFs into sequences that consist of 0 and 1 in order to be used as keys, identities, or nonce for advanced security functions.<\/p>\n\n\n\n

Since there are many ways to produce PUFs, there will also be many differences in its performance. Generally, PUFs can be evaluated by four dimensions including randomness, uniqueness, robustness and traceability as defined below:<\/p>\n\n\n\n