Entropy Loss in PUF-based Key Generation Schemes: The Repetition Code Pitfall

被引:0
|
作者
Koeberl, Patrick [1 ]
Li, Jiangtao [1 ]
Rajan, Anand [1 ]
Wu, Wei [1 ]
机构
[1] Intel Labs, Cambridge, England
关键词
fuzzy extractor; entropy loss analysis; physically unclonable functions; secure key generation; system design; FUZZY EXTRACTORS; BIOMETRICS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the promising usages of Physically Unclonable Functions (PUFs) is to generate cryptographic keys from PUFs for secure storage of key material. This usage has attractive properties such as physical unclonability and enhanced resistance against hardware attacks. In order to extract a reliable cryptographic key from a noisy PUF response a fuzzy extractor is used to convert non-uniform random PUF responses into nearly uniform randomness. Bosch et al. in 2008 proposed a fuzzy extractor suitable for efficient hardware implementation using two-stage concatenated codes, where the inner stage is a conventional error correcting code and the outer stage is a repetition code. In this paper we show that the combination of PUFs with repetition code approaches is not without risk and must be approached carefully. For example, PUFs with min-entropy lower than 66% may yield zero leftover entropy in the generated key for some repetition code configurations. In addition, we find that many of the fuzzy extractor designs in the literature are too optimistic with respect to entropy estimation. For high security applications, we recommend a conservative estimation of entropy loss based on the theoretical work of fuzzy extractors and present parameters for generating 128-bit keys from memory based PUFs.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 50 条
  • [21] Testing Methods for PUF-Based Secure Key Storage Circuits
    Mafalda Cortez
    Gijs Roelofs
    Said Hamdioui
    Giorgio Di Natale
    Journal of Electronic Testing, 2014, 30 : 581 - 594
  • [22] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475
  • [23] An Embedded Key Management System for PUF-based Security Enclosures
    Obermaier, Johannes
    Hauschild, Florian
    Hiller, Matthias
    Sigl, Georg
    2018 7TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2018, : 161 - 166
  • [24] EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
    Tebelmann, Lars
    Pehl, Michael
    Sigl, Georg
    PROCEEDINGS OF THE 2017 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'17), 2017, : 43 - 52
  • [25] PUF-based Key Generation with Design Margin Reduction via In-Situ and PVT Sensor Fusion
    Taneja, Sachin
    Alioto, Massimo
    IEEE 45TH EUROPEAN SOLID STATE CIRCUITS CONFERENCE (ESSCIRC 2019), 2019, : 61 - +
  • [26] A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
    Sathi, Vipin N.
    Rohner, Christian
    Voigt, Thiemo
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 615 - 621
  • [27] Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    Rangasamy, Jothi
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 118 - 121
  • [28] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [29] PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol
    Yildiz, Husnu
    Cenk, Murat
    Onur, Ertan
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5682 - 5696
  • [30] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    FUTURE INTERNET, 2024, 16 (01)