Helper-less physically unclonable functions and chip authentication

Physically Unclonable Functions (PUFs) have been recently proposed as a way to include, in chips, functions that can act as “fingerprints” of the chip, to be used in applications like chip authentication (strong PUF) or private ID generation (weak PUF). Most of the schemes proposed for weak PUF exploit helper data to make the PUF more reliable. The use of an helper, however, has some drawbacks such as complexity and the introduction of a possible attack point. In this manuscript we propose the use of a new type of weak PUF called helper-less PUFs (H-PUF) that does not require the use of helper data. We analyze theoretically the problem of designing an H-PUF and use the result to show how an H-PUF can be built. We also show that the proposed PUF, albeit being of weak type, can also be used for chip authentication.

[1]  Ingrid Verbauwhede,et al.  A soft decision helper data algorithm for SRAM PUFs , 2009, 2009 IEEE International Symposium on Information Theory.

[2]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  Srinivas Devadas,et al.  Reliable and efficient PUF-based key generation using pattern matching , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[4]  岡本 明,et al.  Cryptographic apparatus and method, an encryption system , 2003 .

[5]  Boris Skoric,et al.  The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Scott R. Fluhrer,et al.  Internet Engineering Task Force (ietf) an Eap Authentication Method Based on the Encrypted Key Exchange (eke) Protocol , 2022 .

[7]  Srinivas Devadas,et al.  Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.

[8]  S. Nassif,et al.  Analytical Modeling of SRAM Dynamic Stability , 2006, 2006 IEEE/ACM International Conference on Computer Aided Design.

[9]  Daniel E. Holcomb,et al.  Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .

[10]  Jeroen Delvaux,et al.  Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation , 2014, CT-RSA.

[11]  Georg Sigl,et al.  Semi-invasive EM attack on FPGA RO PUFs and countermeasures , 2011 .

[12]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[13]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[14]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[15]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[16]  Jeroen Delvaux,et al.  Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[17]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.