Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT

被引:1
作者
Zhang, Xiaolin [1 ]
Gu, Dawu [1 ]
Wang, Tengfei [1 ]
Huang, Yu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] HiSilicon Technol Co Ltd, Shenzhen 518129, Guangdong, Peoples R China
关键词
Encryption; Ciphers; Internet of Things; Protocols; Authentication; Physical unclonable function; Hardware; Authenticated encryption (AE); Internet of Things (IoT); key management; physically unclonable function (PUF); PERFORMANCE; PROTOCOL; MODE;
D O I
10.1109/TCAD.2023.3286260
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) facilitates the information exchange between people and smart devices. It needs cryptographic measures to secure its communications and interconnected objects. However, cyber-physical attacks pose a great challenge to the protection of secret keys inside. Physically unclonable function (PUF) is a promising hardware primitive with unclonable structures providing tamper evidence for a device. Moreover, a PUF instance has a unique set of randomized challenge-response pairs. Although it can be integrated into a security scheme to replace long-term keys, designing a dedicated PUF-based cryptographic algorithm that supports peer-to-peer communication remains a challenging field to explore. In this article, we propose SPEAR, a scalable PUF-based authenticated encryption (AE) scheme that uses no cryptographic primitives other than PUF and hash functions. SPEAR can be deployed on peer IoT devices that have performed a handshake protocol to obtain shared credentials. Its security under the chosen ciphertext attack is formally proved using the game-playing technique, and it is still secure when attackers physically extract the credentials. In addition, we give a variant, $x$ SPEAR, to involve associated data and avoid the nonce reuse problem. Compared to other PUF-based ciphers, it performs better in terms of storage overhead and PUF evaluation times. SPEAR first realizes scalable AE based on PUF and can be a practical solution for IoT.
引用
收藏
页码:4569 / 4582
页数:14
相关论文
共 41 条
  • [31] Physical one-way functions
    Pappu, R
    Recht, R
    Taylor, J
    Gershenfeld, N
    [J]. SCIENCE, 2002, 297 (5589) : 2026 - 2030
  • [32] Perkins C., 2003, RFC3561
  • [33] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475
  • [34] Rogaway P., 2006, Rep. 2006/221
  • [35] Rogaway Phillip., 2001, P 8 ACM C COMPUTER C, P196, DOI [10.1145/501983.502011, DOI 10.1145/501983.502011]
  • [36] PUFs in Security Protocols: Attack Models and Security Evaluations
    Ruehrmair, Ulrich
    van Dijk, Marten
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 286 - 300
  • [37] Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
    Wang, Peng
    Li, Yuling
    Zhang, Liting
    Zheng, Kaiyan
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 514 - 532
  • [38] Wu J., 2010, Rep. 2010/171
  • [39] Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs
    Xu, Chongyao
    Zhang, Jieyun
    Law, Man-Kay
    Zhao, Xiaojin
    Mak, Piu-In P.
    Martins, Rui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2188 - 2203
  • [40] PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications
    Yan, Wei
    Zhang, Ning
    Njilla, Laurent L.
    Zhang, Xuan
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (10) : 2196 - 2209