Attacks on Physically-Embedded Data Encryption for Embedded Devices

被引:3
|
作者
Du, Chaohui [1 ]
Bai, Guoqiang [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
关键词
Embedded device; Physical unclonable function; Physical effect; Encryption; Security; Reliability; Known-plaintext attack; Modeling attack; RANDOM NUMBER GENERATOR;
D O I
10.1109/TrustCom.2014.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is the primary method to protect embedded devices in the hostile environment. The security of the traditional data encryption algorithms relies on keeping the keys secret and they always require a lot of arithmetic and logical computations, which may be not suitable for area critical or power critical embedded devices. At TrustCom 2013, Hou et al. proposed to use a physical unclonable function (PUF) to build a novel physically-embedded data encryption (PEDE) for embedded devices. The PEDE is lightweight since all it does is xor-ing the plaintext with the output of a PUF. As the PUF is unique and unclonable, only the original physical device can decrypt the ciphertext. Without possessing the original PEDE device, adversaries could not determine anything about the plaintext even if both the secret key and the ciphertext are available to them. In this paper, we show that the existing PEDE architecture is sensitive to environmental variations, which leads to the fact that the decrypted plaintext does not equal to the original plaintext. Besides the lack of reliability, we also show that the existing PEDE architecture is vulnerable to known-plaintext attack and modeling attack. To address these issues, we propose a secure and robust PEDE architecture.
引用
收藏
页码:967 / 972
页数:6
相关论文
共 50 条
  • [41] Enabling FrodoKEM on Embedded Devices
    Bos J.W.
    Bronchain O.
    Custers F.
    Renes J.
    Verbakel D.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 74 - 96
  • [42] Web embedded field devices
    Lloyd, B
    Susnik, M
    CONFERENCE RECORD OF THE 2002 ANNUAL PULP AND PAPER INDUSTRY TECHNICAL CONFERENCE, 2002, : 199 - 202
  • [43] Web Services on Embedded Devices
    Schall, Daniel
    Aiello, Marco
    Dustdar, Schahram
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2006, 2 (01) : 45 - +
  • [44] Pseudonymous Identification for Embedded Devices
    Hanzlik, Lucjan
    Kluczniak, Kamil
    Kutylowski, Miroslaw
    2016 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND INNOVATIVE BUSINESS PRACTICES FOR THE TRANSFORMATION OF SOCIETIES (EMERGITECH), 2016, : 90 - 93
  • [45] MicroEliece: McEliece for Embedded Devices
    Eisenbarth, Thomas
    Gueneysu, Tim
    Heyse, Stefan
    Paar, Christof
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 49 - 64
  • [46] ONLINE PLATFORM FOR EMBEDDED DEVICES
    Radovici, Alexandru
    Culic, Ioana
    LET'S BUILD THE FUTURE THROUGH LEARNING INNOVATION!, VOL. 2, 2014, : 417 - 421
  • [47] A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
    Shi, Yang
    Wei, Wujing
    Fan, Hongfei
    Au, Man Ho
    Luo, Xiapu
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1411 - 1427
  • [48] Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks
    Lin, Ying-Dar
    Wu, Fan-Cheng
    Huang, Tze-Yau
    Lai, Yuan-Cheng
    Lin, Frank C.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [49] BeepBeep: Embedded real-time encryption
    Driscoll, K
    FAST SOFTWARE ENCRYPTION (REVISED PAPERS), 2002, 2365 : 164 - 178
  • [50] An Embedded Encryption Protocol for Healthcare Networks Security
    Bruce, Ndibanje
    Jang, Won Tae
    Lee, Hoon Jae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 139 - 144