Leveraging Distributions in Physical Unclonable Functions
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by the token to the verifier, and therefore are...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2017-10-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/1/3/17 |
id |
doaj-0253d8d4240d47dba9aa94f33836f132 |
---|---|
record_format |
Article |
spelling |
doaj-0253d8d4240d47dba9aa94f33836f1322020-11-25T01:49:57ZengMDPI AGCryptography2410-387X2017-10-01131710.3390/cryptography1030017cryptography1030017Leveraging Distributions in Physical Unclonable FunctionsWenjie Che0Venkata K. Kajuluri1Fareena Saqib2Jim Plusquellic3Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USADepartment of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USADepartment of Electrical and Computer Engineering, Florida Institute of Technology, Melbourne, FL 32901, USADepartment of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USAA special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by the token to the verifier, and therefore are revealed to the adversary. This enables the adversary to carry out attacks against the token by systematically applying challenges and obtaining responses in an attempt to machine learn, and later predict, the token’s response to an arbitrary challenge. Therefore, strong PUFs must both provide an exponentially large challenge space and be resistant to machine-learning attacks in order to be considered secure. We investigate a transformation called temperature–voltage compensation (TVCOMP), which is used within the Hardware-Embedded Delay PUF (HELP) bit string generation algorithm. TVCOMP increases the diversity and unpredictability of the challenge–response space, and therefore increases resistance to model-building attacks. HELP leverages within-die variations in path delays as a source of random information. TVCOMP is a linear transformation designed specifically for dealing with changes in delay introduced by adverse temperature–voltage (environmental) variations. In this paper, we show that TVCOMP also increases entropy and expands the challenge–response space dramatically.https://www.mdpi.com/2410-387X/1/3/17physical unclonable functionentropystrong PUF |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wenjie Che Venkata K. Kajuluri Fareena Saqib Jim Plusquellic |
spellingShingle |
Wenjie Che Venkata K. Kajuluri Fareena Saqib Jim Plusquellic Leveraging Distributions in Physical Unclonable Functions Cryptography physical unclonable function entropy strong PUF |
author_facet |
Wenjie Che Venkata K. Kajuluri Fareena Saqib Jim Plusquellic |
author_sort |
Wenjie Che |
title |
Leveraging Distributions in Physical Unclonable Functions |
title_short |
Leveraging Distributions in Physical Unclonable Functions |
title_full |
Leveraging Distributions in Physical Unclonable Functions |
title_fullStr |
Leveraging Distributions in Physical Unclonable Functions |
title_full_unstemmed |
Leveraging Distributions in Physical Unclonable Functions |
title_sort |
leveraging distributions in physical unclonable functions |
publisher |
MDPI AG |
series |
Cryptography |
issn |
2410-387X |
publishDate |
2017-10-01 |
description |
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by the token to the verifier, and therefore are revealed to the adversary. This enables the adversary to carry out attacks against the token by systematically applying challenges and obtaining responses in an attempt to machine learn, and later predict, the token’s response to an arbitrary challenge. Therefore, strong PUFs must both provide an exponentially large challenge space and be resistant to machine-learning attacks in order to be considered secure. We investigate a transformation called temperature–voltage compensation (TVCOMP), which is used within the Hardware-Embedded Delay PUF (HELP) bit string generation algorithm. TVCOMP increases the diversity and unpredictability of the challenge–response space, and therefore increases resistance to model-building attacks. HELP leverages within-die variations in path delays as a source of random information. TVCOMP is a linear transformation designed specifically for dealing with changes in delay introduced by adverse temperature–voltage (environmental) variations. In this paper, we show that TVCOMP also increases entropy and expands the challenge–response space dramatically. |
topic |
physical unclonable function entropy strong PUF |
url |
https://www.mdpi.com/2410-387X/1/3/17 |
work_keys_str_mv |
AT wenjieche leveragingdistributionsinphysicalunclonablefunctions AT venkatakkajuluri leveragingdistributionsinphysicalunclonablefunctions AT fareenasaqib leveragingdistributionsinphysicalunclonablefunctions AT jimplusquellic leveragingdistributionsinphysicalunclonablefunctions |
_version_ |
1725003768355880960 |