PUF-PRFs : A New Tamper-resilient Cryptographic Primitive

With the proliferation of physical attacks that may compromise even the theoretically strongest cryptographic schemes, the need for affordable physical protection of cryptographic devices becomes more visible by each day. In this context, Physically Unclonable Functions (PUFs), a promising new technology, provide a low cost technique to realize tamper-resilient storage for secret keys in integrated circuits (ICs). However, PUFs possess some unusual properties that set them apart from ordinary hardware components: their responses are noisy and tend to change when PUFs are manipulated through external influences. These properties have limited the applications of PUFs so far to only physically protecting stored key material. This raises the question as to what extent PUFs can be used to construct other cryptographic schemes. In this paper, we take the first step towards answering this question and place PUFs in the core of a pseudorandom function (PRF) construction. PRFs are one of the most important cryptographic primitives used to design various cryptographic schemes such as stream or block ciphers. We first give a theoretical model for PUFs and justify it by real-life PUF-implementations. Then, we show how to use PUFs to construct tamper-resilient PRFs, termed as PUF-PRFs. However, for several reasons that we outline in this work, PUF-PRFs cannot directly replace PRFs. Nevertheless, we show that PUF-PRFs represent a new cryptographic primitive with very useful properties: they are inherently resilient to tampering attacks and allow for generating (almost) uniformly distributed values.

[1]  Silvio Micali,et al.  On the Cryptographic Applications of Random Functions , 1984, CRYPTO.

[2]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[3]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[4]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[5]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[6]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[7]  Reinhard Posch Protecting Devices by Active Coating , 1998, J. Univers. Comput. Sci..

[8]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[9]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[10]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[11]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[12]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[13]  Srinivas Devadas,et al.  Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[14]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[15]  Silvio Micali,et al.  Physically Observable Cryptography (Extended Abstract) , 2004, Theory of Cryptography Conference.

[16]  Jean-Jacques Quisquater,et al.  A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.

[17]  James Tschanz,et al.  Parameter variations and impact on circuits and microarchitecture , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).

[18]  Silvio Micali,et al.  Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering , 2004, TCC.

[19]  Jinjun Xiong,et al.  Variability-Driven Considerations in the Design of Integrated-Circuit Global Interconnects , 2004 .

[20]  Mark G. Karpovsky,et al.  Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard , 2004, International Conference on Dependable Systems and Networks, 2004.

[21]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[22]  Mark G. Karpovsky,et al.  Non-linear Residue Codes for Robust Public-Key Arithmetic , 2006, FDTC.

[23]  Fmj Frans Willems,et al.  On the security of XOR-method in biometric authentication systems , 2006 .

[24]  Boris Skoric,et al.  Read-Proof Hardware from Protective Coatings , 2006, CHES.

[25]  Ueli Maurer,et al.  Unbreakable Keys from Random Noise , 2007 .

[26]  Jonathan Katz,et al.  Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.

[27]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[28]  Amit Sahai,et al.  New Constructions for UC Secure Computation Using Tamper-Proof Hardware , 2008, EUROCRYPT.

[29]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[30]  Gil Segev,et al.  David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware , 2008, EUROCRYPT.

[31]  Sangyeun Cho,et al.  Decomposition and Analysis of Process Variability Using Constrained Principal Component Analysis , 2008, IEEE Transactions on Semiconductor Manufacturing.

[32]  Berk Sunar,et al.  Towards Robust Low Cost Authentication for Pervasive Devices , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).