Leveraging Distributions in Physical Unclonable Functions

A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by the token to the verifier, and therefore are revealed to the adversary. This enables the adversary to carry out attacks against the token by systematically applying challenges and obtaining responses in an attempt to machine learn, and later predict, the token’s response to an arbitrary challenge. Therefore, strong PUFs must both provide an exponentially large challenge space and be resistant to machine-learning attacks in order to be considered secure. We investigate a transformation called temperature–voltage compensation (TVCOMP), which is used within the Hardware-Embedded Delay PUF (HELP) bit string generation algorithm. TVCOMP increases the diversity and unpredictability of the challenge–response space, and therefore increases resistance to model-building attacks. HELP leverages within-die variations in path delays as a source of random information. TVCOMP is a linear transformation designed specifically for dealing with changes in delay introduced by adverse temperature–voltage (environmental) variations. In this paper, we show that TVCOMP also increases entropy and expands the challenge–response space dramatically.

[1]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[2]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[3]  James F. Plusquellic,et al.  A Privacy-Preserving, Mutual PUF-Based Authentication Protocol , 2017, Cryptogr..

[4]  Dhruva Acharyya,et al.  Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[5]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[6]  Stefan Katzenbeisser,et al.  PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.

[7]  Ingrid Verbauwhede,et al.  A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[8]  Boris Skoric,et al.  Bias-based modeling and entropy analysis of PUFs , 2013, TrustED '13.

[9]  James F. Plusquellic,et al.  Analysis of Entropy in a Hardware-Embedded Delay PUF , 2017, Cryptogr..

[10]  Leyla Nazhandali,et al.  Easy-to-build Arbiter Physical Unclonable Function with enhanced challenge/response set , 2013, International Symposium on Quality Electronic Design (ISQED).

[11]  James F. Plusquellic,et al.  PUF-based authentication , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).