40 research outputs found
Regular variation and free regular infinitely divisible laws
In this article the relation between the tail behaviours of a free regular
infinitely divisible (positively supported) probability measure and its L\'evy
measure is studied. An important example of such a measure is the compound free
Poisson distribution, which often occurs as a limiting spectral distribution of
certain sequences of random matrices. We also describe a connection between an
analogous classical result of Embrechts et al. [1979] and our result using the
Bercovici-Pata bijection.Comment: Revised version, sections re-structured, new applications added and
typos correcte
An Improved DCM-based Tunable True Random Number Generator for Xilinx FPGA
True Random Number Generators (TRNGs) play a very important role in modern cryptographic systems. Field Programmable Gate Arrays (FPGAs) form an ideal platform for hardware implementations of many of these security algorithms. In this paper we present a highly efficient and tunable TRNG based on the principle of Beat Frequency Detection (BFD), specifically for Xilinx FPGA based applications. The main advantages of the proposed TRNG are its on-the-fly tunability through Dynamic Partial Reconfiguration (DPR) to improve randomness qualities. We describe the mathematical model of the TRNG operations, and experimental results for the circuit implemented on a Xilinx Virtex-V FPGA. The proposed TRNG has low hardware footprint and in-built bias elimination capabilities. The random bitstreams generated from it passes all tests in the NIST statistical testsuite
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Robustness to modeling attacks is an important
requirement for PUF circuits. Several reported Arbiter PUF com-
positions have resisted modeling attacks. and often require huge
computational resources for successful modeling. In this paper
we present deep feedforward neural network based modeling
attack on 64-bit and 128-bit Arbiter PUF (APUF), and several
other PUFs composed of Arbiter PUFs, namely, XOR APUF,
Lightweight Secure PUF (LSPUF), Multiplexer PUF (MPUF) and
its variants (cMPUF and rMPUF), and the recently proposed
Interpose PUF (IPUF, up to the (4,4)-IPUF configuration). The
technique requires no auxiliary information (e.g. side-channel
information or reliability information), while employing deep
neural networks of relatively low structural complexity to achieve
very high modeling accuracy at low computational overhead
(compared to previously proposed approaches), and is reasonably
robust to error-inflicted training dataset
A PUF-based Secure Communication Protocol for IoT
Security features are of paramount importance for IoT, and implementations are challenging given the
resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitable for
IoT, to enable secure authentication and message exchange among the devices. Our scheme employs Physically
Unclonable Function (PUF), to generate the public identity of each device, which is used as the public
key for each device for message encryption. We have provided formal proofs of security in the Session Key
security and Universally Composable Framework of the proposed protocol, which demonstrates the resilience
of the scheme against passive as well as active attacks. We have demonstrated the set up required for the
protocol implementation and shown that the proposed protocol implementation incurs low hardware and
software overhead
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
CAS-Lock (proposed in CHES2020), is an advanced logic locking technique that harnesses the concept of single-point function in providing SAT-attack resiliency. It is claimed to be powerful and efficient enough in mitigating state-of-the-art attacks against logic locking techniques. Despite the security robustness of CAS-Lock as claimed by the authors, we expose a serious vulnerability by exploiting the same and device a novel attack algorithm. The proposed attack can reveal the correct key by extracting the Distinguishing Input Patterns (DIPs) pertaining to a carefully chosen key simulation of the locked design. The correct key is obtained from the combination of elements from the set of extracted DIPs.
Our attack is successful against various AND/OR cascaded-chain configurations of CAS-Lock and reports a 100% success rate in recovering the correct key
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA
Recent literature has demonstrated that the security of Physically Unclonable Function (PUF) circuits might be adversely affected by the introduction of faults. In this paper, we propose novel and efficient architectures for a variety of widely used delay-based PUFs which are robust against high precision laser fault attacks proposed by Tajik et al. in FDTC-2015. The proposed architectures can be used to detect run-time modifications in the PUF design due to fault injection. In addition, we propose fault recovery techniques based on either logical reconfiguration or dynamic partial reconfiguration of the PUF design. We validate the robustness of our proposed fault tolerant delay-based PUF designs on Xilinx Artix-7 FPGA platform