Cyber Security: Physically Unclonable Functions