DocumentCode :
2958865
Title :
Security analysis of index-based syndrome coding for PUF-based key generation
Author :
Becker, Georg T. ; Wild, Alexander ; Guneysu, Tim
Author_Institution :
Horst Gortz Inst. for IT-Security, Ruhr-Univ. Bochum, Bochum, Germany
fYear :
2015
fDate :
5-7 May 2015
Firstpage :
20
Lastpage :
25
Abstract :
Physical Unclonable Functions (PUFs) as secure providers for cryptographic keys have gained significant research interest in recent years. Since plain PUF responses are typically unreliable, error-correcting mechanisms are employed to transform a fuzzy PUF response into a deterministic cryptographic key. In this context, Index-Based Syndrome Coding (IBS) has been reported as being provably secure in case of identical and independently distributed PUF responses and is therefore an interesting option to implement a highly secure key provider. In this paper we analyze the security of IBS in combination with a k-sum PUF as proposed at CHES 2011. Since for a k-sum PUF the assumption of identical and independently distributed responses does not hold, the notion of leaked bits was introduced at CHES 2011 to capture the security of such constructions. Based on a refined analysis using hamming distance characterization and machine learning techniques, we show that the entropy of the key obtained is significantly lower than expected. More precisely, we obtained from our findings that even the construction from CHES with the highest security claims only achieves a bit entropy rate of 0.39.
Keywords :
cryptography; fuzzy set theory; learning (artificial intelligence); CHES 2011; IBS; PUF-based key generation; cryptographic keys; deterministic cryptographic key; error-correcting mechanisms; fuzzy PUF response; hamming distance characterization; index-based syndrome coding; k-sum PUF; machine learning techniques; physical unclonable functions; Cost function; Decoding; Encoding; Entropy; Hamming distance; Measurement; Security; Error-Correction; Fuzzy Extractor; Index-Based Syndrome Coding; Physical Unclonable Functions; k-sum PUF;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on
Conference_Location :
Washington, DC
Type :
conf
DOI :
10.1109/HST.2015.7140230
Filename :
7140230
Link To Document :
بازگشت