DocumentCode :
599949
Title :
PHAP: Password based Hardware Authentication using PUFs
Author :
Kumar, Ravindra ; Burleson, Wayne
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA
fYear :
2012
fDate :
1-5 Dec. 2012
Firstpage :
24
Lastpage :
31
Abstract :
Hardware security is gaining significant importance with more emphasis on integrated circuit identification and authentication. To facilitate this process, Physically Unclonable Functions (PUFs) have been proposed as a viable solution. Many of the existing PUF based authentication protocols help to authenticate the device and does not authenticate the user. Here, we present Password based Hardware Authentication using PUF (PHAP), a system that can distinguish between a trusted party and an adversary based on a simple user password during authentication. The hardware authentication is accomplished by providing a seed to a Linear Feedback Shift Register (LFSR) in PHAP, whose output will serve as the final challenge for a PUF block. The seed is obtained by interleaving a shared secret key (session password) with an initial PUF response corresponding to the challenge sent by trusted authority for authentication. We also show that the time difference between real time execution of the system by a trusted party and simulation time by an adversary can be very large which is an attractive property of the new Simulation Possible but Laborious (SIMPL) systems. Our simulation results show that the probability of an adversary successfully attacking the system (by predicting user/session password) is very low (<;10-6%) for a given tmax (10 ms), where tmax is the time within which the response must be computed for valid authentication.
Keywords :
authorisation; cryptographic protocols; probability; shift registers; trusted computing; LFSR; PHAP; PUF based authentication protocol; PUF response; Physically Unclonable Function; SIMPL system; adversary; hardware security; integrated circuit authentication; integrated circuit identification; linear feedback shift register; password based hardware authentication; probability; shared secret key interleaving; simulation possible but laborious system; simulation time; system real time execution; trusted authority; trusted party; user password; user-session password prediction; Authentication; Databases; Hamming distance; Hardware; Protocols; Real-time systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Microarchitecture Workshops (MICROW), 2012 45th Annual IEEE/ACM International Symposium on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4673-4920-8
Type :
conf
DOI :
10.1109/MICROW.2012.14
Filename :
6472488
Link To Document :
بازگشت