Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks

被引:0
作者
Wang, Ye [1 ]
Xi, Xiaodan [1 ]
Orshansky, Michael [1 ]
机构
[1] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
来源
PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2020年
关键词
Strong PUF; PAC Learning; Lattice Cryptography; ML Resistance;
D O I
10.1109/host45689.2020.9300270
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a strong physical unclonable function (PUF) provably secure against machine learning (ML) attacks with both classical and quantum computers. Its security is derived from cryptographic hardness of learning decryption functions of public-key cryptosystems. Our design compactly realizes the decryption function of the learning-with-errors (LWE) cryptosystem. Due to the fundamental connection of LWE to lattice problems, we call the construction the lattice PUF. Lattice PUF is constructed using a physically obfuscated key (POK), an LWE decryption function block, and a linear-feedback shift register (LFSR) as a pseudo-random number generator. The POK provides the secret key of the LWE decryption function; its stability is ensured by a fuzzy extractor (FE). To reduce the challenge size, we exploit distributional relaxations of space-efficient LWEs. That allows only a small challenge-seed to be transmitted with the full-length challenge generated by the LFSR, resulting in a 100X reduction of communication cost. To prevent an active challenge-manipulation attack, a self-incrementing counter is embedded into the challenge seed. We prototyped the lattice PUF with 2136 challenge-response pairs (CRPs) on a Spartan 6 FPGA, which required 45 slices for the PUF logic proper and 233 slices for the FE. Simulation-based evaluation shows the mean (std) of uniformity to be 49.98% (1.58%), of uniqueness to be 50.00% (1.58%), and of reliability to be 1.26% (2.88%). The LWE concrete hardness estimator guarantees that a successful ML attack of the lattice PUF will require the infeasible 2128 CPU operations. Several classes of empirical ML attacks, including support vector machine, logistic regression, and deep neural networks, are used: in all attacks, the prediction error remains above 49.76% after 1 million training CRPs.
引用
收藏
页码:273 / 283
页数:11
相关论文
共 49 条
  • [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
  • [2] Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
  • [3] On the concrete hardness of Learning with Errors
    Albrecht, Martin R.
    Player, Rachel
    Scott, Sam
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) : 169 - 203
  • [4] [Anonymous], 2013, SPACE EFFICIENT VARI
  • [5] Efficient, Reusable Fuzzy Extractors from LWE
    Apon, Daniel
    Cho, Chongwon
    Eldefrawy, Karim
    Katz, Jonathan
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 1 - 18
  • [6] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
    Becker, Georg T.
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555
  • [7] Bernstein D.J., 2009, Post-quantum cryptography, P1, DOI [DOI 10.1007/978-3-540-88702-71, DOI 10.1007/978-3-540-88702-7, 10.1007/978-3-540-88702-7]
  • [8] Bhargava M, 2014, DES AUT TEST EUROPE
  • [9] Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
  • [10] Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575