Entropy Loss in PUF-based Key Generation Schemes: The Repetition Code Pitfall

被引:0
|
作者
Koeberl, Patrick [1 ]
Li, Jiangtao [1 ]
Rajan, Anand [1 ]
Wu, Wei [1 ]
机构
[1] Intel Labs, Cambridge, England
关键词
fuzzy extractor; entropy loss analysis; physically unclonable functions; secure key generation; system design; FUZZY EXTRACTORS; BIOMETRICS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the promising usages of Physically Unclonable Functions (PUFs) is to generate cryptographic keys from PUFs for secure storage of key material. This usage has attractive properties such as physical unclonability and enhanced resistance against hardware attacks. In order to extract a reliable cryptographic key from a noisy PUF response a fuzzy extractor is used to convert non-uniform random PUF responses into nearly uniform randomness. Bosch et al. in 2008 proposed a fuzzy extractor suitable for efficient hardware implementation using two-stage concatenated codes, where the inner stage is a conventional error correcting code and the outer stage is a repetition code. In this paper we show that the combination of PUFs with repetition code approaches is not without risk and must be approached carefully. For example, PUFs with min-entropy lower than 66% may yield zero leftover entropy in the generated key for some repetition code configurations. In addition, we find that many of the fuzzy extractor designs in the literature are too optimistic with respect to entropy estimation. For high security applications, we recommend a conservative estimation of entropy loss based on the theoretical work of fuzzy extractors and present parameters for generating 128-bit keys from memory based PUFs.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 50 条
  • [41] A Lightweight PUF-based Secure Group Key Agreement Protocol for Wireless Sensor Networks
    Zheng, Yue
    Liu, Wenye
    Chang, Chip-Hong
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [42] An Efficient Reliable PUF-Based Cryptographic Key Generator in 65nm CMOS
    Bhargava, Mudit
    Mai, Ken
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [43] An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs
    Ruehrmair, Ulrich
    Jaeger, Christian
    Algasinger, Michael
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2012, 7035 : 190 - +
  • [44] PDAKE Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
    Byun, Jin Wook
    IEEE ACCESS, 2019, 7 : 181165 - 181177
  • [45] PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
    Mall, Priyanka
    Amin, Ruhul
    Das, Ashok Kumar
    Leung, Mark T.
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8205 - 8228
  • [46] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [47] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [48] Reliable and efficient PUF-based cryptographic key generator using bit self-tests
    He, Zhangqing
    Chen, Wanbo
    Xu, Xiong
    Ham, Lein
    Wan, Meilin
    ELECTRONICS LETTERS, 2020, 56 (16) : 803 - 805
  • [49] PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication
    Chen, Liquan
    Zhu, Yaqing
    Liu, Suhui
    Yu, Hongtao
    Zhang, Bing
    COMPUTER COMMUNICATIONS, 2024, 218 : 31 - 43
  • [50] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    China Communications, 2023, 20 (05) : 198 - 216