How do the Arbiter PUFs Sample the Boolean Function Class?

Arbiter based Physical Unclonable Function (sometimes called Physically Unclonable Function, or in short PUF) is a hardware based pseudorandom bit generator. The pseudorandomness in the output bits depends on device specific parameters. For example, based on the delay parameters, an n-length Arbiter PUF can be considered as an n-variable Boolean function. We note that the random variation of the delay parameters cannot exhaust all the Boolean functions and the class is significantly smaller as well as restricted. While this is expected (as the autocorrelation property in certain cases is quite biased), we present a more disciplined and first theoretical combinatorial study in this domain. Our work shows how one can explore the functions achieved through an Arbiter based PUF construction with random delay parameters. Our technique mostly shows limitation of such functions from the angle of cryptographic evaluation as the subclass of the Boolean function can be identified with much better efficiency (much less complexity) than random. On the other hand, we note that under certain constrains on the weights of inputs, such a simple model of Arbiter PUFs provide good cryptographic parameters in terms of differential analysis. In this regard, we theoretically solve the problem of autocorrelation properties in a restricted space of input variables with a fixed weight. Experimental evidences complement our theoretical findings.

[1]  Claude Carlet,et al.  Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts , 2016, EUROCRYPT.

[2]  Stefan Katzenbeisser,et al.  Physically Uncloneable Functions in the Universal Composition Framework , 2011, CRYPTO.

[3]  Ulrich Rührmair,et al.  Strong PUFs: Models, Constructions, and Security Proofs , 2010, Towards Hardware-Intrinsic Security.

[4]  Claude Carlet,et al.  Boolean functions with restricted input and their robustness; application to the FLIP cipher , 2017, IACR Trans. Symmetric Cryptol..

[5]  Pantelimon Stanica,et al.  Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions , 2019, INDOCRYPT.

[6]  Frank Sehnke,et al.  On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..

[7]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[8]  Cunsheng Ding,et al.  On the nonlinearity of Boolean functions with restricted input , 2018, Cryptography and Communications.

[9]  Miodrag Potkonjak,et al.  Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.

[10]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[11]  Srini Devadas Physical Unclonable Functions and Secure Processors , 2009, CHES.

[12]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[13]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[14]  Georg T. Becker,et al.  The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.

[15]  Pantelimon Stanica,et al.  Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP , 2018, INDOCRYPT.

[16]  Srinivas Devadas,et al.  PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Blaise L. P. Gassend,et al.  Physical random functions , 2003 .

[18]  Pantelimon Stanica,et al.  Analysis on Boolean Function in a Restricted (Biased) Domain , 2020, IEEE Transactions on Information Theory.

[19]  Berk Sunar,et al.  PUF-HB: A Tamper-Resilient HB Based Authentication Protocol , 2008, ACNS.

[20]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[21]  Anne Canteaut,et al.  Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.