• DocumentCode
    180762
  • Title

    Entropy loss in PUF-based key generation schemes: The repetition code pitfall

  • Author

    Koeberl, Patrick ; Jiangtao Li ; Rajan, A. ; Wei Wu

  • Author_Institution
    Intel Labs., Hillsboro, OR, USA
  • fYear
    2014
  • fDate
    6-7 May 2014
  • Firstpage
    44
  • Lastpage
    49
  • Abstract
    One of the promising usages of Physically Unclonable Functions (PUFs) is to generate cryptographic keys from PUFs for secure storage of key material. This usage has attractive properties such as physical unclonability and enhanced resistance against hardware attacks. In order to extract a reliable cryptographic key from a noisy PUF response a fuzzy extractor is used to convert non-uniform random PUF responses into nearly uniform randomness. Bösch et al. in 2008 proposed a fuzzy extractor suitable for efficient hardware implementation using two-stage concatenated codes, where the inner stage is a conventional error correcting code and the outer stage is a repetition code. In this paper we show that the combination of PUFs with repetition code approaches is not without risk and must be approached carefully. For example, PUFs with min-entropy lower than 66% may yield zero leftover entropy in the generated key for some repetition code configurations. In addition, we find that many of the fuzzy extractor designs in the literature are too optimistic with respect to entropy estimation. For high security applications, we recommend a conservative estimation of entropy loss based on the theoretical work of fuzzy extractors and present parameters for generating 128-bit keys from memory based PUFs.
  • Keywords
    concatenated codes; cryptography; entropy; error correction codes; fuzzy set theory; storage management; PUF-based key generation schemes; concatenated codes; cryptographic keys; entropy loss; error correcting code; fuzzy extractor; hardware attacks; min-entropy; physically unclonable functions; repetition code pitfall; secure storage; Concatenated codes; Cryptography; Data mining; Decoding; Entropy; Estimation; entropy loss analysis; fuzzy extractor; physically unclonable functions; secure key generation; system design;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on
  • Conference_Location
    Arlington, VA
  • Print_ISBN
    978-1-4799-4114-8
  • Type

    conf

  • DOI
    10.1109/HST.2014.6855566
  • Filename
    6855566