Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
Open Access
- 16 January 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Emerging Topics in Computing
- Vol. 2 (1), 37-49
- https://doi.org/10.1109/tetc.2014.2300635
Abstract
This paper proposes novel robust and low-overhead physical unclonable function (PUF) authentication and key exchange protocols that are resilient against reverse-engineering attacks. The protocols are executed between a party with access to a physical PUF (prover) and a trusted party who has access to the PUF compact model (verifier). The proposed protocols do not follow the classic paradigm of exposing the full PUF responses or a transformation of them. Instead, random subsets of the PUF response strings are sent to the verifier so the exact position of the subset is obfuscated for the third-party channel observers. Authentication of the responses at the verifier side is done by matching the substring to the available full response string; the index of the matching point is the actual obfuscated secret (or key) and not the response substring itself. We perform a thorough analysis of resiliency of the protocols against various adversarial acts, including machine learning and statistical attacks. The attack analysis guides us in tuning the parameters of the protocol for an efficient and secure implementation. The low overhead and practicality of the protocols are evaluated and confirmed by hardware implementation.Keywords
Funding Information
- Army Research Office (R17450)
- Office of Naval Research (R16480)
- Semiconductor Research Corporation (1836.039)
- NSF CAREER (NSF-0644289)
This publication has 23 references indexed in Scilit:
- Hardware Metering: A SurveyPublished by Springer Science and Business Media LLC ,2011
- Security Based on Physical Unclonability and DisorderPublished by Springer Science and Business Media LLC ,2011
- Reliable and efficient PUF-based key generation using pattern matchingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Physically Unclonable Functions: A Study on the State of the Art and Future Research DirectionsPublished by Springer Science and Business Media LLC ,2010
- DSPs, BRAMs, and a Pinch of LogicACM Transactions on Reconfigurable Technology and Systems, 2010
- Techniques for Design and Implementation of Secure Reconfigurable PUFsACM Transactions on Reconfigurable Technology and Systems, 2009
- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile ComputingPublished by Springer Science and Business Media LLC ,2009
- Hardware-Based Public-Key Cryptography with Public Physically Unclonable FunctionsLecture Notes in Computer Science, 2009
- Physical unclonable functions for device authentication and secret key generationProceedings of the 39th conference on Design automation - DAC '02, 2007
- Physical One-Way FunctionsScience, 2002