Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses

05/19/2018
by   Yansong Gao, et al.
0

The physical unclonable function (PUF), alike fingerprint of human being, exploits manufacturing randomness to bind each physical item with a unique identifier. One primary PUF application is for securely cryptographic key derivation via fuzzy extractor that comprises two sequential procedures: error correction and entropy extractor. Despite the entropy extractor can be very lightweight, the overhead of the error correction logic responsible for reconciling natural fuzzy PUF responses is, nonetheless, very expensive. This runs into hardness when the PUF targets to secure resource-constraint Internet of Things (IoT) objects e.g., with limited computational power and battery lifetime. In this work, we recognize that there is an approximately linear relationship between the response unreliability and operating condition (e.g., voltage and temperature) under which the PUF works. For the first time, we exploit such an important but inadvertent fact. Instead of enrolling only a single response under the nominal operating condition during the PUF key provisioning phase, we propose to lodge multiple referenced responses (MRR), subject to the same challenge, produced under multiple discrete operating conditions. As an immediate application, we combine MRR with the reverse fuzzy extractor (RFE) to realize a MRR based RFE (MR^3FE) that fits lightweight mutual authentication well attributing to the greatly reduced overhead. To examine the MRR's generalization, it is adopted to the FE case, termed as MR^2FE. Software implementation of both MR^3FE and MR^2FE is comprehensively carried on the computational radio frequency identification (CRFID) device that is battery-less and resource-restrict.

READ FULL TEXT

page 1

page 6

research
02/08/2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices

A securely maintained key is the premise upon which data stored and tran...
research
07/29/2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

A physical unclonable function (PUF) generates hardware intrinsic volati...
research
02/28/2020

Photonic Physical Unclonable Functions: From the Concept to Fully Functional Device Operating in the Field

The scope of this paper is to demonstrate a fully working and compact ph...
research
07/19/2023

EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

Physical unclonable functions (PUFs) are hardware-oriented primitives th...
research
07/28/2018

Crossover RO PUF-based Key Sharing for IoT Security

In many Internet of Things (IoT) applications, resources like CPU, memor...
research
09/30/2019

Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks

We propose a strong physical unclonable function (PUF) that is provably ...
research
08/19/2020

Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

Physical Unclonable Functions (PUFs) are gaining attention in the crypto...

Please sign up or login with your details

Forgot password? Click here to reset