PUF Crypto-block Introduction

PUF Crypto-block Introduction

Brief introduction to Physically Unclonable Function signature methods, in the context of the Wireless Embedded Systems MSc course dissertation project.

07216c4af8d6c07ab7f880305ca339d9?s=128

Konstantinos Goutsos

March 13, 2015
Tweet

Transcript

  1. 1.

    PUF Crypto-block Konstantinos Goutsos EEE8097: Individual Project School of Electrical

    and Electronic Engineering Newcastle University March 2015 - Newcastle Upon Tyne, UK 1
  2. 2.

    Physically Unclonable Functions (PUFs) Physical: Quantifying minor hardware variations Unclonable:

    Variations cannot be measured or controlled Exploit these defects to produce unique responses March 2015 - Newcastle Upon Tyne, UK 2
  3. 3.

    PUF Model PUF Measurement Error Correction Response Hash Function Unique

    Output Challenge March 2015 - Newcastle Upon Tyne, UK 3
  4. 4.

    PUF Taxonomy Delay based March 2015 - Newcastle Upon Tyne,

    UK 4 PUFs Memory based Butterfly Latch SRAM Flip-flop Scan Path Arbiter Ring Oscillator
  5. 7.

    Attacks against PUFs →Invasive attacks: Believed to be infeasible →Offline

    attacks: Cannot be applied →Modelling attacks: Use a number of challenge/response pairs model the PUF (Rührmair 2010) March 2015 - Newcastle Upon Tyne, UK 7
  6. 8.

    Technical Aims o Create a PUF data signature system prototype

    o Design a source device verification scheme using a 3rd party device (while keeping the PUF details private) March 2015 - Newcastle Upon Tyne, UK 8
  7. 9.

    PUF Crypto-block: Motivation Growing need for source identification of digital

    data Security issues increasingly important (i.e. Internet of Things) Copyright and other legal issues Privacy protection is imperative March 2015 - Newcastle Upon Tyne, UK 9
  8. 10.

    Possible Applications →Wireless Sensor Networks, Internet of Things →Intellectual Property

    protection →Enhanced security protocols (i.e. using SmartCards) March 2015 - Newcastle Upon Tyne, UK 10
  9. 11.

    Objectives (1)  Design and develop a PUF-based signature generation

    system March 2015 - Newcastle Upon Tyne, UK 11 SRAM Measurement Error Correction Hash Function Signature FPGA/Software Signing Data
  10. 12.

    Objectives (2)  Build a prototype and acquire metrics 

    Evaluate system correctness, performance and security March 2015 - Newcastle Upon Tyne, UK 12
  11. 13.

    Objectives (3) March 2015 - Newcastle Upon Tyne, UK 13

    Signature Block Data Signature Data PUF Key Verification Block Result Data Signature Source Device Verification third-party  Develop a signature scheme aided by the PUF and a third-party verifier Signature Block Data Signature Data PUF Key Verification Block Result Data Signature Source Device Verification third-party
  12. 14.

    PUF Crypto-block A system for PUF-aided data signing without leaking

    any information about the PUF. Thank you for your attention. March 2015 - Newcastle Upon Tyne, UK 16
  13. 15.

    References C. Herder, M. D. Yu, F. Koushanfar, and S.

    Devadas, “Physical unclonable functions and applications: A tutorial,” Proceedings of the IEEE, vol. 102, no. 8. pp. 1126–1141, 2014. D. E. Holcomb, W. P. Burleson, and K. Fu, “Power-Up SRAM state as an identifying fingerprint and source of true random numbers,” IEEE Trans. Comput., vol. 58, pp. 1198– 1210, 2009. U. Rührmair, F. Sehnke, J. S ölter, G. Dror, S. Devadas, and J. Ü. Schmidhuber, “Modeling attacks on physical unclonable functions,” Proc. 17th ACM Conf. Comput. Commun. Secur. - CCS ’10, p. 237, 2010. March 2015 - Newcastle Upon Tyne, UK 17