Abstract
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems and as such their responses are inherently noisy, precluding a straightforward derivation of cryptographic key material from raw PUF measurements. To overcome this drawback, Fuzzy Extractors are used to eliminate the noise and guarantee robust outputs. A special type are Reverse Fuzzy Extractors, shifting the computational load of error correction towards a computationally powerful verifier. However, the Reverse Fuzzy Extractor reveals error patterns to any eavesdropper, which may cause privacy issues (if the PUF key is drifting, the error pattern is linkable to the identity) and even security problems (if the noise is data-dependent and multiple protocol transcripts can be linked to the same user). In this work we evaluate the effects of aging on popular PUF implementations and investigate its impact on the security properties of the Reverse Fuzzy Extractor.
Original language | English |
---|---|
Title of host publication | TrustED 2015 - Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, co-located with CCS 2015 |
Publisher | Association for Computing Machinery, Inc |
Pages | 15-20 |
Number of pages | 6 |
ISBN (Electronic) | 9781450338288 |
DOIs | |
Publication status | Published - 16 Oct 2015 |
Event | 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015 - Denver, United States Duration: 16 Oct 2015 → … |
Conference
Conference | 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015 |
---|---|
Country/Territory | United States |
City | Denver |
Period | 16/10/15 → … |
Keywords
- Error correction
- Information leakage
- Physically unclonable functions