Attacks on Physically-Embedded Data Encryption for Embedded Devices

被引:3
|
作者
Du, Chaohui [1 ]
Bai, Guoqiang [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
关键词
Embedded device; Physical unclonable function; Physical effect; Encryption; Security; Reliability; Known-plaintext attack; Modeling attack; RANDOM NUMBER GENERATOR;
D O I
10.1109/TrustCom.2014.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is the primary method to protect embedded devices in the hostile environment. The security of the traditional data encryption algorithms relies on keeping the keys secret and they always require a lot of arithmetic and logical computations, which may be not suitable for area critical or power critical embedded devices. At TrustCom 2013, Hou et al. proposed to use a physical unclonable function (PUF) to build a novel physically-embedded data encryption (PEDE) for embedded devices. The PEDE is lightweight since all it does is xor-ing the plaintext with the output of a PUF. As the PUF is unique and unclonable, only the original physical device can decrypt the ciphertext. Without possessing the original PEDE device, adversaries could not determine anything about the plaintext even if both the secret key and the ciphertext are available to them. In this paper, we show that the existing PEDE architecture is sensitive to environmental variations, which leads to the fact that the decrypted plaintext does not equal to the original plaintext. Besides the lack of reliability, we also show that the existing PEDE architecture is vulnerable to known-plaintext attack and modeling attack. To address these issues, we propose a secure and robust PEDE architecture.
引用
收藏
页码:967 / 972
页数:6
相关论文
共 50 条
  • [21] Ferroelectric embedded devices
    Rohm Co, Ltd, Kyoto, Japan
    Integr Ferroelectr, 1 -4 pt 1 (41-51):
  • [22] Steganography on embedded devices
    Stanescu, Daniela
    Stangaciu, Valentin
    Ghergulescu, Ioana
    Stratulat, Mircea
    SACI: 2009 5TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, 2009, : 303 - 307
  • [23] Keeping embedded secure: Authentication and encryption
    Weng, W
    ELECTRONIC DESIGN, 2001, 49 (07) : 124 - +
  • [24] Lightweight Software Encryption for Embedded Processors
    Hiscock, Thomas
    Savry, Olivier
    Goubin, Louis
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 213 - 220
  • [25] An embedded RSA processor for encryption and decryption
    Yang, Q
    Wu, XJ
    Zhou, R
    Lu, RB
    2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 356 - 359
  • [26] Cryptanalysis of an embedded systems’ image encryption
    Imad El Hanouti
    Hakim El Fadili
    Khalid Zenkouar
    Multimedia Tools and Applications, 2021, 80 : 13801 - 13820
  • [27] Cryptanalysis of an embedded systems' image encryption
    El Hanouti, Imad
    El Fadili, Hakim
    Zenkouar, Khalid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 13801 - 13820
  • [28] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    Nyman, Thomas
    Dessouky, Ghada
    Zeitouni, Shaza
    Lehikoinen, Aaro
    Paverd, Andrew
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [29] Toward a Framework for Embedded & Collaborative Data Analysis with Heterogeneous Devices
    Goeminne, Mathieu
    Boukhebouze, Mohamed
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 381 - 386
  • [30] Vehicle Embedded Data Stream Processing Platform for Android Devices
    Akiyama, Shingo
    Nakamoto, Yukikazu
    Yamaguchi, Akihiro
    Sato, Kenya
    Takada, Hiroaki
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (02) : 285 - 294