Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

被引:0
作者
Yu, Meng-Day [1 ]
M'Raihi, David [1 ]
Sowell, Richard [1 ]
Devadas, Srinivas [2 ]
机构
[1] Verayo Inc, San Jose, CA USA
[2] MIT, Cambridge, MA USA
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011 | 2011年 / 6917卷
关键词
Physical Unclonable Functions; Key Generation; Syndrome Distribution Shaping; Machine Learning; FPGA; ASIC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightweight error correction code (ECC) encoder / decoder is used. With a register count of 69, this codec core does not use any traditional error correction techniques and is 75% smaller than a previous provably secure implementation, and yet achieves robust environmental performance in 65nm FPGA and 0.13 mu ASIC implementations. The security of the syndrome bits uses a new security argument that relies on what cannot be learned from a machine learning perspective. The number of Leaked Bits is determined for each Syndrome Word, reducible using Syndrome Distribution Shaping. The design is secure from a min-entropy standpoint against a machine-learning-equipped adversary that, given a ceiling of leaked bits, has a classification error bounded by epsilon. Numerical examples are given using latest machine learning results.
引用
收藏
页码:358 / +
页数:3
相关论文
共 21 条
[1]  
[Anonymous], 2006, Elements of Information Theory
[2]  
[Anonymous], 2003, THESIS
[3]  
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[4]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+
[5]  
Dodis Y., 2008, FUZZY EXTRACTORS GEN
[6]   Controlled Physical Random Functions [J].
Gassend, B ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :149-160
[7]  
Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
[8]  
Holcomb D.E., 2007, C RFID SEC
[9]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]  
Krawczyk H., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P129