PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

09/11/2018
by   Weize Yu, et al.
0

In this letter, a physical unclonable function (PUF)-advanced encryption standard (AES)-PUF is proposed as a new PUF architecture by embedding an AES cryptographic circuit between two conventional PUF circuits to conceal their challenge-to-response pairs (CRPs) against machine learning attacks. Moreover, an internal confidential data is added to the secret key of the AES cryptographic circuit in the new PUF architecture to update the secret key in real-time against side-channel attacks. As shown in the results, even if 1 million number of data are enabled by the adversary to implement machine learning or side-channel attacks, the proposed PUF can not be cracked. By contrast, only 5,000 (1,000) number of data are sufficient to leak the confidential information of a conventional PUF via machine learning (side-channel) attacks.

READ FULL TEXT
research
07/18/2023

On Borrowed Time – Preventing Static Power Side-Channel Analysis

In recent years, static power side-channel analysis attacks have emerged...
research
07/08/2020

Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET)

Side-channel attacks have empowered bypassing of cryptographic component...
research
01/05/2022

Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

Side Channel Analysis attacks take advantage of the information leaked f...
research
11/30/2020

Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX

Side-channel vulnerabilities of Intel SGX is driving the research commun...
research
01/28/2019

Quantitative Verification of Masked Arithmetic Programs against Side-Channel Attacks

Power side-channel attacks, which can deduce secret data via statistical...
research
10/29/2019

MaskedNet: A Pathway for Secure Inference against Power Side-Channel Attacks

Differential Power Analysis (DPA) has been an active area of research fo...
research
07/05/2021

Proving SIFA Protection of Masked Redundant Circuits

Implementation attacks like side-channel and fault attacks pose a consid...

Please sign up or login with your details

Forgot password? Click here to reset