Controlled physical random functions and applications

被引:79
作者
Gassend, Blaise [1 ]
Van Dijk, Marten [1 ]
Clarke, Dwaine [1 ]
Torlak, Emina [1 ]
Devadas, Srinivas [1 ]
Tuyls, Pim [2 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] Philips Res Labs, Eindhoven, Netherlands
关键词
security; theory; certified execution; physical security; physical random function; physical unclonable function; trusted computing;
D O I
10.1145/1284680.1284683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in consumer devices. Protecting these keys from invasive attackers, who open a device to steal its key, is a challenging problem. We propose controlled physical random functions ( CPUFs) as an alternative to storing keys and describe the core protocols that are needed to use CPUFs. A physical random functions (PUF) is a physical system with an input and output. The functional relationship between input and output looks like that of a random function. The particular relationship is unique to a specific instance of a PUF, hence, one needs access to a particular PUF instance to evaluate the function it embodies. The cryptographic applications of a PUF are quite limited unless the PUF is combined with an algorithm that limits the ways in which the PUF can be evaluated; this is a CPUF. A major difficulty in using CPUFs is that you can only know a small set of outputs of the PUF - the unknown outputs being unrelated to the known ones. We present protocols that get around this difficulty and allow a chain of trust to be established between the CPUF manufacturer and a party that wishes to interact securely with the PUF device. We also present some elementary applications, such as certified execution.
引用
收藏
页数:22
相关论文
共 31 条
[11]   Identification and authentication of integrated circuits [J].
Gassend, B ;
Lim, D ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11) :1077-1098
[12]  
Gassend B., 2002, P COMP COMM SEC C
[13]  
GASSEND B., 2003, P 9 INT S HIGH PERF
[14]  
Gutmann P, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P77
[15]   Alloy: A lightweight object modelling notation [J].
Jackson, D .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2002, 11 (02) :256-290
[16]  
JACKSON D, 2000, P ACM SIGSOFT C FDN
[17]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[18]  
LEE JW, 2004, P IEEE VLSI CIRC S
[19]  
LIE D, 2000, P 9 INT C ARCH SUPP, P168
[20]  
LIE D, 2003, THESIS STANFORD U