38 research outputs found
Regular variation and free regular infinitely divisible laws
In this article the relation between the tail behaviours of a free regular
infinitely divisible (positively supported) probability measure and its L\'evy
measure is studied. An important example of such a measure is the compound free
Poisson distribution, which often occurs as a limiting spectral distribution of
certain sequences of random matrices. We also describe a connection between an
analogous classical result of Embrechts et al. [1979] and our result using the
Bercovici-Pata bijection.Comment: Revised version, sections re-structured, new applications added and
typos correcte
An Improved DCM-based Tunable True Random Number Generator for Xilinx FPGA
True Random Number Generators (TRNGs) play a very important role in modern cryptographic systems. Field Programmable Gate Arrays (FPGAs) form an ideal platform for hardware implementations of many of these security algorithms. In this paper we present a highly efficient and tunable TRNG based on the principle of Beat Frequency Detection (BFD), specifically for Xilinx FPGA based applications. The main advantages of the proposed TRNG are its on-the-fly tunability through Dynamic Partial Reconfiguration (DPR) to improve randomness qualities. We describe the mathematical model of the TRNG operations, and experimental results for the circuit implemented on a Xilinx Virtex-V FPGA. The proposed TRNG has low hardware footprint and in-built bias elimination capabilities. The random bitstreams generated from it passes all tests in the NIST statistical testsuite
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Robustness to modeling attacks is an important
requirement for PUF circuits. Several reported Arbiter PUF com-
positions have resisted modeling attacks. and often require huge
computational resources for successful modeling. In this paper
we present deep feedforward neural network based modeling
attack on 64-bit and 128-bit Arbiter PUF (APUF), and several
other PUFs composed of Arbiter PUFs, namely, XOR APUF,
Lightweight Secure PUF (LSPUF), Multiplexer PUF (MPUF) and
its variants (cMPUF and rMPUF), and the recently proposed
Interpose PUF (IPUF, up to the (4,4)-IPUF configuration). The
technique requires no auxiliary information (e.g. side-channel
information or reliability information), while employing deep
neural networks of relatively low structural complexity to achieve
very high modeling accuracy at low computational overhead
(compared to previously proposed approaches), and is reasonably
robust to error-inflicted training dataset
A PUF-based Secure Communication Protocol for IoT
Security features are of paramount importance for IoT, and implementations are challenging given the
resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitable for
IoT, to enable secure authentication and message exchange among the devices. Our scheme employs Physically
Unclonable Function (PUF), to generate the public identity of each device, which is used as the public
key for each device for message encryption. We have provided formal proofs of security in the Session Key
security and Universally Composable Framework of the proposed protocol, which demonstrates the resilience
of the scheme against passive as well as active attacks. We have demonstrated the set up required for the
protocol implementation and shown that the proposed protocol implementation incurs low hardware and
software overhead
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA
Recent literature has demonstrated that the security of Physically Unclonable Function (PUF) circuits might be adversely affected by the introduction of faults. In this paper, we propose novel and efficient architectures for a variety of widely used delay-based PUFs which are robust against high precision laser fault attacks proposed by Tajik et al. in FDTC-2015. The proposed architectures can be used to detect run-time modifications in the PUF design due to fault injection. In addition, we propose fault recovery techniques based on either logical reconfiguration or dynamic partial reconfiguration of the PUF design. We validate the robustness of our proposed fault tolerant delay-based PUF designs on Xilinx Artix-7 FPGA platform
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Besides security against classical cryptanalysis, its important
for cryptographic implementations to have sufficient robustness against
side-channel attacks. Many countermeasures have been proposed to thwart
side channel attacks, especially power trace measurement based side
channel attacks. Additionally, researchers have proposed several evaluation
metrics to evaluate side channel security of crypto-system. However,
evaluation of any crypto-system is done during the testing phase and is
not part of the actual hardware. In our approach, we propose to implement
such evaluation metrics on-chip for run-time side channel vulnerability
estimation of a cryptosystem. The objective is to create a watchdog
on the hardware which will monitor the side channel leakage of the device,
and will alert the user if that leakage crosses a pre-determined threshold,
beyond which the system might be considered vulnerable. Once such
alert signal is activated, proactive countermeasures can be activated either
at the device level or at the protocol level, to prevent the impending
side channel attack. A FPGA based prototype designed by us show low
hardware overhead, and is an effective option that avoids the use of bulky
and inconvenient on-field measurement setup