325 research outputs found
Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes
Physical Unclonable Functions can be used for secure key generation in
cryptographic applications. It is explained how methods from coding theory must
be applied in order to ensure reliable key regeneration. Based on previous
work, we show ways how to obtain better results with respect to error
probability and codeword length. Also, an example based on Generalized
Concatenated codes is given, which improves upon used coding schemes for PUFs.Comment: Accepted for: Fourteenth International Workshop on Algebraic and
Combinatorial Coding Theory ACCT2014, Svetlogorsk (Kaliningrad region),
Russi
Constructing an LDPC Code Containing a Given Vector
The coding problem considered in this work is to construct a linear code
of given length and dimension such that a given binary
vector is contained in the code. We study a
recent solution of this problem by M\"uelich and Bossert, which is based on
LDPC codes. We address two open questions of this construction. First, we show
that under certain assumptions, this code construction is possible with high
probability if is chosen uniformly at random. Second, we calculate
the uncertainty of given the constructed code . We
present an application of this problem in the field of Physical Unclonable
Functions (PUFs).Comment: 5 pages, accepted at the International Workshop on Algebraic and
Combinatorial Coding Theory, 201
Memory-based Combination PUFs for Device Authentication in Embedded Systems
Embedded systems play a crucial role in fueling the growth of the
Internet-of-Things (IoT) in application domains such as healthcare, home
automation, transportation, etc. However, their increasingly network-connected
nature, coupled with their ability to access potentially sensitive/confidential
information, has given rise to many security and privacy concerns. An
additional challenge is the growing number of counterfeit components in these
devices, resulting in serious reliability and financial implications.
Physically Unclonable Functions (PUFs) are a promising security primitive to
help address these concerns. Memory-based PUFs are particularly attractive as
they require minimal or no additional hardware for their operation. However,
current memory-based PUFs utilize only a single memory technology for
constructing the PUF, which has several disadvantages including making them
vulnerable to security attacks. In this paper, we propose the design of a new
memory-based combination PUF that intelligently combines two memory
technologies, SRAM and DRAM, to overcome these shortcomings. The proposed
combination PUF exhibits high entropy, supports a large number of
challenge-response pairs, and is intrinsically reconfigurable. We have
implemented the proposed combination PUF using a Terasic TR4-230 FPGA board and
several off-the-shelf SRAMs and DRAMs. Experimental results demonstrate
substantial improvements over current memory-based PUFs including the ability
to resist various attacks. Extensive authentication tests across a wide
temperature range (20 - 60 deg. Celsius) and accelerated aging (12 months)
demonstrate the robustness of the proposed design, which achieves a 100%
true-positive rate and 0% false-positive rate for authentication across these
parameter ranges.Comment: 7 pages, 10 figure
A formal definition and a new security mechanism of physical unclonable functions
The characteristic novelty of what is generally meant by a "physical
unclonable function" (PUF) is precisely defined, in order to supply a firm
basis for security evaluations and the proposal of new security mechanisms. A
PUF is defined as a hardware device which implements a physical function with
an output value that changes with its argument. A PUF can be clonable, but a
secure PUF must be unclonable. This proposed meaning of a PUF is cleanly
delineated from the closely related concepts of "conventional unclonable
function", "physically obfuscated key", "random-number generator", "controlled
PUF" and "strong PUF". The structure of a systematic security evaluation of a
PUF enabled by the proposed formal definition is outlined. Practically all
current and novel physical (but not conventional) unclonable physical functions
are PUFs by our definition. Thereby the proposed definition captures the
existing intuition about what is a PUF and remains flexible enough to encompass
further research. In a second part we quantitatively characterize two classes
of PUF security mechanisms, the standard one, based on a minimum secret
read-out time, and a novel one, based on challenge-dependent erasure of stored
information. The new mechanism is shown to allow in principle the construction
of a "quantum-PUF", that is absolutely secure while not requiring the storage
of an exponentially large secret. The construction of a PUF that is
mathematically and physically unclonable in principle does not contradict the
laws of physics.Comment: 13 pages, 1 figure, Conference Proceedings MMB & DFT 2012,
Kaiserslautern, German
RPUF: A Highly Reliable Memristive Device based Reconfigurable PUF
We present a memristive device based RPUF construction achieving highly
desired PUF properties, which are not offered by most current PUF designs: (1)
High reliability, almost 100\% that is crucial for PUF-based cryptographic key
generations, significantly reducing, or even eliminating the expensive overhead
of on-chip error correction logic and the associated helper on-chip data
storage or off-chip storage and transfer. (2) Reconfigurability, while current
PUF designs rarely exhibit such an attractive property. We validate our RPUF via extensive Monte-Carlo simulations in Cadence based on parameters of
real devices. The RPUF is simple, cost-effective and easy to manage
compared to other PUF constructions exhibiting high reliability or
reconfigurability. None of previous PUF constructions is able to provide both
desired high reliability and reconfigurability concurrently
UNBIAS PUF: A Physical Implementation Bias Agnostic Strong PUF
The Physical Unclonable Function (PUF) is a promising hardware security
primitive because of its inherent uniqueness and low cost. To extract the
device-specific variation from delay-based strong PUFs, complex routing
constraints are imposed to achieve symmetric path delays; and systematic
variations can severely compromise the uniqueness of the PUF. In addition, the
metastability of the arbiter circuit of an Arbiter PUF can also degrade the
quality of the PUF due to the induced instability. In this paper we propose a
novel strong UNBIAS PUF that can be implemented purely by Register Transfer
Language (RTL), such as verilog, without imposing any physical design
constraints or delay characterization effort to solve the aforementioned
issues. Efficient inspection bit prediction models for unbiased response
extraction are proposed and validated. Our experimental results of the strong
UNBIAS PUF show 5.9% intra-Fractional Hamming Distance (FHD) and 45.1%
inter-FHD on 7 Field Programmable Gate Array (FPGA) boards without applying any
physical layout constraints or additional XOR gates. The UNBIAS PUF is also
scalable because no characterization cost is required for each challenge to
compensate the implementation bias. The averaged intra-FHD measured at worst
temperature and voltage variation conditions is 12%, which is still below the
margin of practical Error Correction Code (ECC) with error reduction techniques
for PUFs
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
The two-terminal key agreement problem with biometric or physical identifiers
is considered. Two linear code constructions based on Wyner-Ziv coding are
developed. The first construction uses random linear codes and achieves all
points of the key-leakage-storage regions of the generated-secret and
chosen-secret models. The second construction uses nested polar codes for
vector quantization during enrollment and for error correction during
reconstruction. Simulations show that the nested polar codes achieve
privacy-leakage and storage rates that improve on existing code designs. One
proposed code achieves a rate tuple that cannot be achieved by existing
methods.Comment: To appear in IEEE Transactions on Information Forensics and Securit
On the Key Generation Rate of Physically Unclonable Functions
In this paper, an algebraic binning based coding scheme and its associated
achievable rate for key generation using physically unclonable functions (PUFs)
is determined. This achievable rate is shown to be optimal under the
generated-secret (GS) model for PUFs. Furthermore, a polar code based
polynomial-time encoding and decoding scheme that achieves this rate is also
presented
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures
Physically Unclonable Functions (PUFs) are potential security blocks to
generate unique and more secure keys in low-cost cryptographic applications.
Dynamic random-access memory (DRAM) has been proposed as one of the promising
candidates for generating robust keys. Unfortunately, the existing techniques
of generating device signatures from DRAM is very slow, destructive (destroy
the current data), and disruptive to system operation. In this paper, we
propose \textit{precharge} latency-based PUF (PreLatPUF) that exploits DRAM
\textit{precharge} latency variations to generate signatures. The proposed
PreLatPUF is fast, robust, least disruptive, and non-destructive. The silicon
results from commercially available chips from different manufacturers
show that the proposed key generation technique is at least
faster than the existing approaches, while reliably reproducing the key in
extreme operating conditions
- …