Machine learning of physical unclonable functions using helper data revealing a pitfall in the fuzzy commitment scheme

被引:0
作者
Strieder E. [1 ]
Frisch C. [2 ]
Pehl M. [2 ]
机构
[1] Technical University of Munich, Department of Electrical and Computer Engineering
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2021年 / 2021卷 / 02期
关键词
Error Correcting Code; Fuzzy Commitment Scheme; Fuzzy Extractor; Key Distribution; Key Storage; Machine Learning; Neural Network; Physical Unclonable Function; PUF; Supervised Learning;
D O I
10.46586/tches.v2021.i2.1-36
中图分类号
学科分类号
摘要
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such schemes are deemed to be secure even for PUFs with challenge-response behavior, as long as no responses and no reliability information about the PUF are exposed. This work, however, reveals a pitfall in these constructions: When using state-of-the-art helper data algorithms to correct noisy PUF responses, an attacker can exploit the publicly accessible helper data and challenges. We show that with this public information and the knowledge of the underlying error correcting code, an attacker can break the security of the system: The redundancy in the error correcting code reveals machine learnable features and labels. Learning these features and labels results in a predictive model for the dependencies between different challenge-response pairs (CRPs) without direct access to the actual PUF response. We provide results based on simulated data of a k-SUM PUF model and an Arbiter PUF model. We also demonstrate the attack for a k-SUM PUF model generated from real data and discuss the impact on more recent PUF constructions such as the Multiplexer PUF and the Interpose PUF. The analysis reveals that especially the frequently used repetition code is vulnerable: For a SUM-PUF in combination with a repetition code, e.g., already the observation of 800 challenges and helper data bits suffices to reduce the entropy of the key down to one bit. The analysis also shows that even other linear block codes like the BCH, the Reed-Muller, or the Single Parity Check code are affected by the problem. The code-dependent insights we gain from the analysis allow us to suggest mitigation strategies for the identified attack. While the shown vulnerability advances Machine Learning (ML) towards realistic attacks on key-storage systems with PUFs, our analysis also facilitates a better understanding and evaluation of existing approaches and protocols with PUFs. Therefore, it brings the community one step closer to a more complete leakage assessment of PUFs. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:1 / 36
页数:35
相关论文
共 72 条
  • [1] Becker G., The gap between promise and reality: On the insecurity of XOR arbiter PUFs, Cryptographic Hardware and Embedded Systems – CHES 2015, (2015)
  • [2] Bosch C., Guajardo J., Sadeghi A.-R., Shokrollahi J., Tuyls P., Efficient helper data key extractor on FPGAs, International Workshop on
  • [3] Cryptographic Hardware and Embedded Systems, pp. 181-197, (2008)
  • [4] Becker G. T., Wild A., Guneysu T., Security analysis of index-based syndrome coding for PUF-based key generation, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 20-25, (2015)
  • [5] Chen Q., Csaba G., Lugli P., Schlichtmann U., Ruhrmair U., The Bistable Ring PUF: A New Architecture for Strong Physical Unclonable Functions, IEEE Int. Symposium on Hardware-Oriented Security and Trust, (2011)
  • [6] Chen B., Ignatenko T., Willems F. M. J., Maes R., van der Sluis E., Selimis G., A robust SRAM-PUF key generation scheme based on polar codes, GLOBECOM 2017-2017 IEEE Global Communications Conference, pp. 1-6, (2017)
  • [7] Delvaux J., Security analysis of PUF-based key generation and entity authentication, (2017)
  • [8] Delvaux J., Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs, IEEE Transactions on Information Forensics and Security, 14, 8, pp. 2043-2058, (2019)
  • [9] Desset C., Macq B., Vandendorpe L., Block error-correcting codes for systems with a very high BER: Theoretical analysis and application to the protection of watermarks, Signal Processing: Image Communication, 17, 5, pp. 409-421, (2002)
  • [10] Dodis Y., Reyzin L., Smith A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, International conference on the theory and applications of cryptographic techniques, pp. 523-540, (2004)