{"id":361859,"date":"2024-10-20T01:37:58","date_gmt":"2024-10-20T01:37:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-20897-12020\/"},"modified":"2024-10-26T02:32:42","modified_gmt":"2024-10-26T02:32:42","slug":"bs-iso-iec-20897-12020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-20897-12020\/","title":{"rendered":"BS ISO\/IEC 20897-1:2020"},"content":{"rendered":"
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.<\/p>\n
Amongst PUF use cases, random number generation is out of scope in this document.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms 5 Security requirements for PUFs 5.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 PUF interface 5.3 PUF building blocks <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.4 Use cases of PUF 5.4.1 Security parameter generation <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4.2 Device identification 5.4.3 Device authentication <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.5 Security requirements 5.5.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.5.2 Steadiness <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5.3 Randomness 5.5.4 Uniqueness 5.5.5 Tamper-resistance 5.5.6 Mathematical unclonability 5.5.7 Physical unclonability 5.6 Mapping between security requirements and use cases <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex A (informative) Classification of PUF <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex B (informative) Some PUF implementations <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex C (informative) PUF life-cycle <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Physically unclonable functions – Security requirements<\/b><\/p>\n |