Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

被引:183
作者
Delvaux, Jeroen [1 ,2 ,3 ]
Gu, Dawu [4 ]
Schellekens, Dries [5 ]
Verbauwhede, Ingrid [2 ,6 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn Comp Secur & Ind Cryptog COSIC, B-3001 Leuven, Belgium
[2] iMinds, Brussels, Belgium
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Lab Cryptol & Comp Secur LoCCS, Shanghai 200240, Peoples R China
[4] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, LoCCS, Shanghai 200240, Peoples R China
[5] Septentrio Satellite Nav, B-3001 Leuven, Belgium
[6] Katholieke Univ Leuven, Dept Elect Engn Comp Secur & Ind Cryptog, B-3001 Leuven, Belgium
关键词
Helper data algorithm (HDA); key generation; physically unclonable function (PUF); FUZZY EXTRACTORS; ERROR-CORRECTION; SECURE; AUTHENTICATION; IMPLEMENTATION; BIOMETRICS;
D O I
10.1109/TCAD.2014.2370531
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. Third, we identify several hiatuses/open problems in existing literature.
引用
收藏
页码:889 / 902
页数:14
相关论文
共 47 条
[1]  
Ahsanullah M., 2013, ATLANTIS STUDIES PRO, V3
[2]  
[Anonymous], 2007, Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting
[3]  
[Anonymous], P DATE
[4]  
Armknecht F, 2009, LECT NOTES COMPUT SC, V5912, P685, DOI 10.1007/978-3-642-10366-7_40
[5]  
Bhargava M., 2014, 2014 Design, Automation Test in Europe Conference Exhibition (DATE), P1, DOI DOI 10.7873/DATE.2014.083
[6]  
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[7]  
Boyen X, 2005, LECT NOTES COMPUT SC, V3494, P147
[8]  
Delvaux Jeroen, 2014, Topics in Cryptology - CT-RSA 2014. The Cryptographers Track at the RSA Conference 2014. Proceedings: LNCS 8366, P106, DOI 10.1007/978-3-319-04852-9_6
[9]  
Delvaux J, 2014, DES AUT TEST EUROPE
[10]   Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes [J].
Delvaux, Jeroen ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (06) :1701-1713