skip to main content
10.1145/2995289.2995293acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Online Reliability Testing for PUF Key Derivation

Published: 28 October 2016 Publication History

Abstract

Physical Unclonable Functions (PUFs) measure manufacturing variations inside integrated circuits to derive internal secrets during run-time and avoid to store secrets permanently in non-volatile memory. PUF responses are noisy such that they require error correction to generate reliable cryptographic keys. To date, when needed one single key is reproduced in the field and always used, regardless of its reliability. In this work, we compute online reliability information for a reproduced key and perform multiple PUF readout and error correction steps in case of an unreliable result. This permits to choose the most reliable key among multiple derived key candidates with different corrected error patterns. We achieve the same average key error probability from less PUF response bits with this approach. Our proof of concept design for a popular reference scenario uses Differential Sequence Coding (DSC) and a Viterbi decoder with reliability output information. It requires 39% less PUF response bits and 16% less helper data bits than the regular approach without the option for multiple readouts.

References

[1]
C. Herder, M. Yu, F. Koushanfar, and S. Devadas, "Physical unclonable functions and applications: A tutorial," Proceedings of the IEEE, vol. 102, no. 8, pp. 1126--1141, 2014.
[2]
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in ACM/IEEE Design Automation Conference (DAC), 2007, pp. 9--14.
[3]
J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer Berlin / Heidelberg, 2007, pp. 63--80.
[4]
B. Gassend, D. Clarke, M. v. Dijk, and S. Devadas, "Delay-based circuit authentication and applications," in ACM Symposium on Applied Computing (SAC), 2003, pp. 294--301.
[5]
O. Gunlu and G. Kramer, "Privacy, secrecy, and storage with noisy identifiers," Tech. Rep., 2016.
[6]
R. Maes, P. Tuyls, and I. Verbauwhede, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. Lecture Notes in Computer Science, C. Clavier and K. Gaj, Eds., vol. 5747. Springer Berlin / Heidelberg, 2009, pp. 332--347.
[7]
M. Hiller, D. Merli, F. Stumpf, and G. Sigl, "Complementary IBS: Application specific error correction for PUFs," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012, pp. 1--6.
[8]
V. van der Leest, B. Preneel, and E. van der Sluis, "Soft decision error correction for compact memory-based pufs using a single enrollment," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. Lecture Notes in Computer Science, E. Prou and P. Schaumont, Eds., vol. 7428. Springer Berlin / Heidelberg, 2012, pp. 268--282.
[9]
M. Hiller, M. Weiner, L. Rodrigues Lima, M. Birkner, and G. Sigl, "Breaking through xed PUF block limitations with di erential sequence coding and convolutional codes," in International Workshop on Trustworthy Embedded Devices (TrustED). ACM, 2013, pp. 43--54.
[10]
A. R. Raghavan and C. W. Baum, "A reliability output Viterbi algorithm with applications to hybrid ARQ," IEEE Transactions on Information Theory, vol. 44, no. 3, pp. 1214--1216, 1998.
[11]
M. Yu, M. Hiller, and S. Devadas, "Maximum likelihood decoding of device-specific multi-bit symbols for reliable key generation," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2015, pp. 38--43.
[12]
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology (EUROCRYPT), ser. Lecture Notes in Computer Science, C. Cachin and J. L. Camenisch, Eds., vol. 3027. Springer Berlin / Heidelberg, 2004, pp. 523--540.
[13]
C. Bosch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer Berlin / Heidelberg, 2008, pp. 181--197.
[14]
M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 48--65, 2010.
[15]
P. Elias, "Coding for noisy channels," Proceedings of the Institute of Radio Engineers, vol. 43, no. 3, pp. 356--356, 1955.
[16]
M. Bossert, Channel Coding for Telecommunications. New York: John Wiley & Sons, 1999.
[17]
A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," IEEE Transactions on Information Theory, vol. 13, no. 2, pp. 260--269, 1967.
[18]
M. Hiller, L. Rodrigues Lima, and G. Sigl, "Seesaw: An area-optimized FPGA Viterbi decoder for PUFs," in Euromicro Conference on Digital System Design (DSD), 2014, pp. 387--393.
[19]
J. Hagenauer and P. Hoeher, "A Viterbi algorithm with soft-decision outputs and its applications," in IEEE Global Telecommunications Conference and Exhibition (GLOBECOM), 1989, pp. 1680--1686 vol.3.
[20]
J. C. Fricke and P. A. Hoeher, "Word error probability estimation by means of a modified Viterbi decoder," in IEEE Vehicular Technology Conference (VTC), 2007, pp. 1113--1116.
[21]
G. Schnabl and M. Bossert, "Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes," IEEE Transactions on Information Theory, vol. 41, no. 1, pp. 304--308, 1995.
[22]
M. Hiller, M. Yu, and G. Sigl, "Cherry-picking reliable PUF bits with differential sequence coding," IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2065--2076, 2016.

Cited By

View all
  • (2021)FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor2021 18th International Conference on Privacy, Security and Trust (PST)10.1109/PST52912.2021.9647783(1-12)Online publication date: 13-Dec-2021
  • (2020)Review of error correction for PUFs and evaluation on state-of-the-art FPGAsJournal of Cryptographic Engineering10.1007/s13389-020-00223-wOnline publication date: 11-May-2020
  • (2019)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be SolvedIEEE Internet of Things Journal10.1109/JIOT.2018.28477336:2(1606-1616)Online publication date: Apr-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
October 2016
74 pages
ISBN:9781450345675
DOI:10.1145/2995289
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. coding theory
  2. physical unclonable functions
  3. secret key derivation
  4. syndrome coding

Qualifiers

  • Research-article

Funding Sources

  • Fraunhofer Gesellschaft

Conference

CCS'16
Sponsor:

Acceptance Rates

TrustED '16 Paper Acceptance Rate 6 of 12 submissions, 50%;
Overall Acceptance Rate 24 of 49 submissions, 49%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor2021 18th International Conference on Privacy, Security and Trust (PST)10.1109/PST52912.2021.9647783(1-12)Online publication date: 13-Dec-2021
  • (2020)Review of error correction for PUFs and evaluation on state-of-the-art FPGAsJournal of Cryptographic Engineering10.1007/s13389-020-00223-wOnline publication date: 11-May-2020
  • (2019)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be SolvedIEEE Internet of Things Journal10.1109/JIOT.2018.28477336:2(1606-1616)Online publication date: Apr-2019
  • (2019)Overview of IoT Security Architecture2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2019.00058(338-345)Online publication date: Jun-2019
  • (2019)Research on Identity Certification Framework Model in core business of Power GridIOP Conference Series: Materials Science and Engineering10.1088/1757-899X/677/4/042009677(042009)Online publication date: 10-Dec-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media