Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

08/19/2020
by   Xinhui Lai, et al.
0

Physical Unclonable Functions (PUFs) are gaining attention in the cryptography community because of the ability to efficiently harness the intrinsic variability in the manufacturing process. However, this means that they are noisy devices and require error correction mechanisms, e.g., by employing Fuzzy Extractors (FEs). Recent works demonstrated that applying FEs for error correction may enable new opportunities to break the PUFs if no countermeasures are taken. In this paper, we address an attack model on FEs hardware implementations and provide a solution for early identification of the timing Side-Channel Attack (SCA) vulnerabilities which can be exploited by physical fault injection. The significance of this work stems from the fact that FEs are an essential building block in the implementations of PUF-enabled devices. The information leaked through the timing side-channel during the error correction process can reveal the FE input data and thereby can endanger revealing secrets. Therefore, it is very important to identify the potential leakages early in the process during RTL design. Experimental results based on RTL analysis of several Bose-Chaudhuri-Hocquenghem (BCH) and Reed-Solomon decoders for PUF-enabled devices with FEs demonstrate the feasibility of the proposed methodology.

READ FULL TEXT
research
03/09/2023

Quantum memory error correction computation based on Chamon model

Quantum error correction codes play a central role in the realisation of...
research
11/09/2016

A Brief Survey of Non-Residue Based Computational Error Correction

The idea of computational error correction has been around for over half...
research
03/04/2022

Boosting the Performance of Quantum Annealers using Machine Learning

Noisy intermediate-scale quantum (NISQ) devices are spearheading the sec...
research
05/05/2023

Microarchitectures for Heterogeneous Superconducting Quantum Computers

Noisy Intermediate-Scale Quantum Computing (NISQ) has dominated headline...
research
02/03/2022

The Wiretap Channel for Capacitive PUF-Based Security Enclosures

In order to protect devices from physical manipulations, protective secu...
research
01/14/2005

Spike timing precision and neural error correction: local behavior

The effects of spike timing precision and dynamical behavior on error co...
research
05/19/2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses

The physical unclonable function (PUF), alike fingerprint of human being...

Please sign up or login with your details

Forgot password? Click here to reset