Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
Top Cited Papers
- 24 November 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- Vol. 34 (6), 889-902
- https://doi.org/10.1109/tcad.2014.2370531
Abstract
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. Third, we identify several hiatuses/open problems in existing literature.Keywords
Funding Information
- European Commission through the ICT programme (FP7-ICT-2011-317930 HINT)
- Research Council of KU Leuven: GOA TENSE (GOA/11/007)
- Flemish Government (FWO G.0550.12N)
- Hercules Foundation (AKUL/11/19)
- National Major Development Program for Fundamental Research of China (973 Plan) (2013CB338004)
- IWT-Flanders (SBO 121552)
This publication has 25 references indexed in Scilit:
- The Spammed Code Offset MethodIEEE Transactions on Information Forensics and Security, 2014
- Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental ChangesIEEE Transactions on Circuits and Systems I: Regular Papers, 2014
- Breaking through fixed PUF block limitations with differential sequence coding and convolutional codesPublished by Association for Computing Machinery (ACM) ,2013
- Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noisePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Complementary IBS: Application specific error correction for PUFsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Reliable and efficient PUF-based key generation using pattern matchingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random FunctionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Robust Key Extraction from Physical Uncloneable FunctionsLecture Notes in Computer Science, 2005
- Silicon physical random functionsPublished by Association for Computing Machinery (ACM) ,2002