Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








40 Hits in 5.9 sec

Key Reconciliation Protocols For Error Correction Of Silicon Puf Responses

Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
2017 Zenodo  
This is currently achieved using error-correcting codes in secure sketches, that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols.  ...  Physical Unclonable Functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC).  ...  Fondation de Recherche pour l'Aéronautique et l'Espace", funding for this project was also provided by a grant from "La Région Rhône-Alpes".  ... 
doi:10.5281/zenodo.571744 fatcat:w7a42dlxbrcovlsvpxzhn4kq6i

Key Reconciliation Protocols for Error Correction of Silicon PUF Responses

Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hely
2017 IEEE Transactions on Information Forensics and Security  
This is currently achieved using error-correcting codes in secure sketches, that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols.  ...  Physical Unclonable Functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC).  ...  Fondation de Recherche pour l'Aéronautique et l'Espace", funding for this project was also provided by a grant from "La Région Rhône-Alpes".  ... 
doi:10.1109/tifs.2017.2689726 fatcat:pjdusbncpncjtpgidstacqta7i

Brand and IP protection with physical unclonable functions

Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, Pim Tuyls
2008 2008 IEEE International Symposium on Circuits and Systems  
They can be turned into a useful tool to generate very secure secret keys in ICs and to provide keys to protect valuable IP of fabless IC companies, IP Vendors and design houses.  ...  We will present several examples and explain cryptographic algorithms and protocols to use them in IP protection applications.  ...  This error rate can be efficiently corrected via error correcting codes.  ... 
doi:10.1109/iscas.2008.4542135 dblp:conf/iscas/GuajardoKST08 fatcat:btue2qus7zg2nc5cff2uzmes5q

Hardware authentication based on PUFs and SHA-3 2nd round candidates

Susana Eiroa, Iluminada Baturone
2010 2010 International Conference on Microelectronics  
This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks.  ...  Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they  ...  To ensure correcting any possibly small error in the PUF response, a repetition code R(3,1) has been selected. IV.  ... 
doi:10.1109/icm.2010.5696149 fatcat:m3lfe7gdsncqfmwa267jq3mvy4

Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection

Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, Pim Tuyls
2007 2007 International Conference on Field Programmable Logic and Applications  
In this paper, we propose new protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography, analyze the advantages and costs of such an approach, and describe a PUF intrinsic  ...  To this end solutions have been proposed based on the idea of bitstream encryption, symmetric-key primitives, and the use of Physical Unclonable Functions (PUFs).  ...  PUF-BASED IP AUTHENTICATION FOR FPGAS In this section, we introduce protocols based on PK encryption for protection of IP blocks.  ... 
doi:10.1109/fpl.2007.4380646 dblp:conf/fpl/GuajardoKST07 fatcat:svhzz6g72beghobug6ynizhp6m

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

Jorge Guajardo, Boris Škorić, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert-Jan Schrijen
2008 Information Systems Frontiers  
In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID systems based on the use of Physical Unclonable Functions (PUFs).  ...  Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones.  ...  For our applications Q will be a finite field of characteristic p and often of characteristic two. Error Correcting Codes.  ... 
doi:10.1007/s10796-008-9142-z fatcat:a5x7bzyvprexpflzg65wvpaphi

Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems

Mafalda Cortez, Said Hamdioui, Ali Kaichouhi, Vincent der van der Leest, Roel Maes, Geert-Jan Schrijen
2015 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
The efficiency and cost of silicon physically unclonable function (PUF)-based applications, and in particular key generators, are heavily impacted by the level of reproducibility of the bare PUF responses  ...  Error-correcting codes (ECCs) can be used to achieve near-perfect reliability, but come at a high implementation cost especially when the underlying PUF is very noisy.  ...  Information reconciliation is enabled by error correction blocks, while privacy amplification is enabled by hash function, see Fig. 7 .  ... 
doi:10.1109/tcad.2015.2422844 fatcat:rokkgtzm5jdknliwqpd3aj27qu

Authenticated secret key generation in delay-constrained wireless systems

Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian
2020 EURASIP Journal on Wireless Communications and Networking  
All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.  ...  Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper.  ...  Numerous practical information reconciliation approaches using standard forward error correction codes (e.g., LDPC, BCH) have been proposed [16, 75] .  ... 
doi:10.1186/s13638-020-01742-0 fatcat:qhpm5xingvhh5boj2pomy3rj4a

A Formalization of the Security Features of Physical Functions

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann
2011 2011 IEEE Symposium on Security and Privacy  
PUFs have recently been proposed for various applications, including anticounterfeiting schemes, key generation algorithms, and in the design of block ciphers.  ...  However, currently only rudimentary security models for PUFs exist, limiting the confidence in the security claims of PUF-based security primitives.  ...  ACKNOWLEDGEMENTS We thank Pim Tuyls for several useful discussions and the anonymous reviewers for their helpful comments.  ... 
doi:10.1109/sp.2011.10 dblp:conf/sp/ArmknechtMSSW11 fatcat:7oj5r3dldbcyncbib7ov6p3gfq

Physical Unclonable Functions and Their Applications to Vehicle System Security

Muhammad Asim, Jorge Guajardo, Sandeep S. Kumar, Pim Tuyls
2009 VTC Spring 2009 - IEEE 69th Vehicular Technology Conference  
In addition, the suitability of PUFs for vehicle insurance applications is explained.  ...  Recently Physical Unclonable Functions (PUFs) attracted significant interest for numerous applications such as protection of software and hardware IPs, secure key storages and components identification  ...  Examples of PUFs include optical PUFs [28] , silicon PUFs [10] and coating PUFs [32] .  ... 
doi:10.1109/vetecs.2009.5073800 dblp:conf/vtc/AsimGKT09 fatcat:yormkgiv4rhirhljk2p4n5s32u

Authenticated Secret Key Generation in Delay Constrained Wireless Systems [article]

Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian
2020 arXiv   pre-print
All of the proposed mechanisms, have the potential to pave the way for a new breed of latency aware security protocols.  ...  Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper.  ...  LM contributed on the use of Effective Capacity within this framework. MM carried out the simulations and prepared the graphs. All authors contributed and edited the manuscript.  ... 
arXiv:2001.07162v2 fatcat:nae36pvpe5adxj7etxwoitv7aq

Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses

Yansong Gao, Yang Su, Lei Xu, Damith C. Ranasinghe
2019 IEEE Transactions on Information Forensics and Security  
Overall, MRR greatly reduces the demand for the expected number of erroneous bits for correction and, subsequently, achieve a significant reduction in the error correction overhead.  ...  Although the entropy extractor can be lightweight, the overhead of the secure sketch responsible correcting naturally noisy PUF responses is usually costly.  ...  However, the ability to mount the attacks depends on: i) the error-correction code employed; and ii) the method used for error-correction.  ... 
doi:10.1109/tifs.2018.2886624 fatcat:k4fiob4ipvhrlggua4eetzigx4

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs [article]

Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe
2020 arXiv   pre-print
Although PUFs provide the potential for lightweight and secure authentication for increasing numbers of low-end Internet of Things devices, practical and secure mechanisms remain elusive.  ...  can exploit the SimPUF to perform a trial-and-error search over likely error patterns to recover the noisy response to authenticate the prover.  ...  Reconciling Response Errors In literature, stabilizing response errors usually targets the PUF based key generation application-works targeting authentication may choose [8] simple error correction code  ... 
arXiv:1807.11046v2 fatcat:xwwfmqwihjeqtl4dgbkgeofrkm

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
PUFs usually need to team up with other building blocks, e.g., true random number generators (TRNGs), cryptographic algorithms, error-correcting codes, non-volatile memory (NVM), etc.  ...  This building block can hence be understood as the silicon equivalent of human biometrics.  ...  We therefore assume the complete absence of error-correction techniques, which makes the protocol non-functional.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication [article]

Miroslav Mitev, Mahdi Shekiba-Herfeh, Arsenia Chorti, Martin Reed
2021 arXiv   pre-print
The SKG keys are incorporated in a zero-round-trip-time resumption protocol for fast re-authentication.  ...  In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protocol that uniquely combines PUFs, proximity estimation and SKG.  ...  One of the main features of BCH codes during code design is the number of guaranteed correctable error bits.  ... 
arXiv:2010.14457v2 fatcat:x2botjix5bcwbe5g2bmybf4lme
« Previous Showing results 1 — 15 out of 40 results