Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

@article{Lai2020EarlyRA,
  title={Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices},
  author={X. Lai and M. Jenihhin and G. Selimis and Sven Goossens and R. Maes and K. Paul},
  journal={2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC)},
  year={2020},
  pages={16-21}
}
  • X. Lai, M. Jenihhin, +3 authors K. Paul
  • Published 2020
  • Computer Science
  • 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC)
Physical Unclonable Functions (PUFs) are gaining attention in the cryptography community because of the ability to efficiently harness the intrinsic variability in the manufacturing process. However, this means that they are noisy devices and require error correction mechanisms, e.g., by employing Fuzzy Extractors (FEs). Recent works demonstrated that applying FEs for error correction may enable new opportunities to break the PUFs if no countermeasures are taken. In this paper, we address an… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 20 REFERENCES
Side-Channel Analysis of PUFs and Fuzzy Extractors
TLDR
A proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis. Expand
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
TLDR
This work proposes two primitives: a fuzzy extractor extracts nearly uniform randomness R from its biometric input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Expand
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
TLDR
This paper utilizes several fuzzy extractor techniques based on using different error correction coding methods to generate secret keys from the SRAM PUF, and study the trade-off between the false authentication rate and false rejection rate of the PUF. Expand
An Introduction to Reed–Solomon Codes
TLDR
This chapter introduces coding and decoding in a Reed-Solomon code, using Reed and Solomon’s original encoding procedure and the Welch-Berlekamp decoding procedure, which reduces to finding solutions of a system of n linear equations in \(n + 1\) unknowns. Expand
Building Secure SRAM PUF Key Generators on Resource Constrained Devices
TLDR
This work presents a methodology for constructing a lightweight and secure PUF key generator for resource limited devices and focuses on PUFs constructed from pervasively embedded SRAM in modern microcontroller units. Expand
PASCAL: Timing SCA Resistant Design and Verification Flow
TLDR
An approach/flow – PASCAL – that works on RTL designs and discovers potential Timing Side Channel Attack (SCA) vulnerabilities in them and is able to identify Timing Disparate Security Paths that could lead to information leakage. Expand
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice
  • G. Becker
  • Computer Science
  • IEEE Transactions on Dependable and Secure Computing
  • 2019
TLDR
This paper shows that the original provable secure robust fuzzy extractor construction by Boyen et al. actually does not fulfill the error-correction requirements for practical PUF applications, and presents novel helper data manipulation attacks on fuzzy extractors that also work if a “robust fuzzy Extractor-like” construction without this strict bound is used. Expand
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
TLDR
Non-invasive measurement of electromagnetic radiation together with a differential power analysis is shown to be sufficient to extract not only single bits but even the complete key from an error correction used for PUF-based key generation. Expand
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
TLDR
This paper is the first to provide an in-depth and comprehensive literature overview on HDAs, and does expose new threats regarding helper data leakage and manipulation. Expand
Fault Model Analysis of Laser-Induced Faults in SRAM Memory Cells
TLDR
It is investigated whether the bit-set/reset fault model or bit-flip fault model may be encountered in SRAMs and whether fault injections have been performed on the RAM memory of a micro-controller to check the validity of the previous results. Expand
...
1
2
...