A Formal Foundation for the Security Features of Physical Functions

被引:85
作者
Armknecht, Frederik [1 ]
Maes, Roel [2 ]
Sadeghi, Ahmad-Reza [3 ]
Standaert, Francois-Xavier [4 ]
Wachsmann, Christian [5 ]
机构
[1] Univ Mannheim, D-6800 Mannheim 1, Germany
[2] Katholieke Univ Leuven, ESAT COSIC, IBBT, Leuven, Belgium
[3] Tech Univ Darmstadt, Fraunhofer SIT Darmstadt, Darmstadt, Germany
[4] Catholic Univ Louvain, Louvain, Belgium
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) | 2011年
关键词
Physically Unclonable Function (PUF); Formal Security Model; Robustness; Unclonability; Unpredictability; AUTHENTICATION; KEYS;
D O I
10.1109/SP.2011.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g., side-channels attacks) or erroneous computations (e.g., fault injection attacks). Preventing or detecting these attacks has become a challenging task in modern cryptographic research. In this context intrinsic physical properties of integrated circuits, such as Physical(ly) Unclonable Functions (PUFs), can be used to complement classical cryptographic constructions, and to enhance the security of cryptographic devices. PUFs have recently been proposed for various applications, including anti-counterfeiting schemes, key generation algorithms, and in the design of block ciphers. However, currently only rudimentary security models for PUFs exist, limiting the confidence in the security claims of PUF-based security primitives. A useful model should at the same time (i) define the security properties of PUFs abstractly and naturally, allowing to design and formally analyze PUF-based security solutions, and (ii) provide practical quantification tools allowing engineers to evaluate PUF instantiations. In this paper, we present a formal foundation for security primitives based on PUFs. Our approach requires as little as possible from the physics and focuses more on the main properties at the heart of most published works on PUFs: robustness (generation of stable answers), unclonability (not provided by algorithmic solutions), and unpredictability. We first formally define these properties and then show that they can be achieved by previously introduced PUF instantiations. We stress that such a consolidating work allows for a meaningful security analysis of security primitives taking advantage of physical properties, becoming increasingly important in the development of the next generation secure information systems.
引用
收藏
页码:397 / 412
页数:16
相关论文
共 40 条
[1]  
[Anonymous], 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P100, DOI 10.1109/HST.2010.5513105
[2]  
[Anonymous], P IEEE INT WORKSH HA
[3]  
[Anonymous], 2008, P 3 BEN WORKSH INF S
[4]  
[Anonymous], 2007, 2007 IEEE INT SOLID
[5]  
[Anonymous], 2001, Ph.D. thesis
[6]  
Armknecht F, 2009, LECT NOTES COMPUT SC, V5912, P685, DOI 10.1007/978-3-642-10366-7_40
[7]  
Bauder D., 1983, PTK11990 SAND NAT LA
[8]   Fingerprinting' documents and packaging [J].
Buchanan, JDR ;
Cowburn, RP ;
Jausovec, AV ;
Petit, D ;
Seem, P ;
Xiong, G ;
Atkinson, D ;
Fenton, K ;
Allwood, DA ;
Bryan, MT .
NATURE, 2005, 436 (7050) :475-475
[9]   How to strongly link data and its medium: the paper case [J].
Bulens, P. ;
Standaert, F-X. ;
Quisquater, J. -J. .
IET INFORMATION SECURITY, 2010, 4 (03) :125-136
[10]  
Carter J. Lawrence, 1977, Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC'77, page, P106, DOI [DOI 10.1145/800105.803400, 10.1145/800105.803400]