algebraic security analysis of key generation
play

Algebraic Security Analysis of Key Generation with Physical - PowerPoint PPT Presentation

Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2


  1. Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2 Technical University of Munich 3 Fraunhofer AISEC PROOFS 20.08.2016 Santa Barbara

  2. Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2 Technical University of Munich 3 Fraunhofer AISEC PROOFS 20.08.2016 Santa Barbara

  3. Introduction PUFs 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 3

  4. Example: SRAM PUF Guajardo et al. (CHES 2007) 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 4

  5. Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2 Technical University of Munich 3 Fraunhofer AISEC PROOFS 20.08.2016 Santa Barbara

  6. Secret Key Generation Syndrome Coding 2-part approach Secret PUF Response & Public Helper Data 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 6

  7. Secret Key Generation (2) Need for Error Correction 520 Bit - Secret + Redundancy Reproduction with 15% Bit Error Probability 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 7

  8. Motivation Initial Problem: Find a simple and generic representation of PUF key generation Main Contribution: New representation shows if helper data can leak key information (upper bound, qualitative result) For quantitative results see e.g. Delvaux et al. , CHES 2016 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 8

  9. Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2 Technical University of Munich 3 Fraunhofer AISEC PROOFS 20.08.2016 Santa Barbara

  10. Algebraic Core 𝐁 𝑀 𝐁 𝑆 Random Number R y y Algebraic Core A PUF Response X Helper Data W Secret S 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 10

  11. Algebraic Core 𝐁 𝑀 𝐁 𝑆 R X S W 𝑇 𝑋 = 𝑆 𝑌 𝐁 See paper for the algebraic cores of several key generation schemes 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 11

  12. Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller 1 , Michael Pehl 1 , Gerhard Kramer 2 and Georg Sigl 1,3 1 Chair of Security in Information Technology 2 Chair of Communications Engineering 2 Technical University of Munich 3 Fraunhofer AISEC PROOFS 20.08.2016 Santa Barbara

  13. Generic Security Criterion 𝐁 𝑀 𝐁 𝑆 R X S W 𝑇 = 𝑆 𝑌 𝐁 𝑀 𝑋 = 𝑆 𝑌 𝐁 𝑆 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 13

  14. Generic Security Criterion 𝐁 𝑀 𝐁 𝑆 We define the rank loss Δ as R Δ = 𝑠𝑏𝑜𝑙(𝐁 𝑀 ) + 𝑠𝑏𝑜𝑙(𝐁 𝑆 ) − 𝑠𝑏𝑜𝑙(𝐁) X Result without proof: S W No leakage between S and W if Δ = 0 S and W can only be linearly independent iff 𝑠𝑏𝑜𝑙(𝐁) = 𝑠𝑏𝑜𝑙(𝐁 𝑀 ) + 𝑠𝑏𝑜𝑙(𝐁 𝑆 ) 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 14

  15. Analysis of the State of the Art Example: Code-Offset Fuzzy Extractor (Dodis et al ., Eurocrypt 2004) ( n,k,d ) code with generator Matrix G 𝑇 = 𝑌 𝐁 𝑀 𝐁 𝑆 W = R G + X R 𝟏 𝐇 X 𝐉 𝐉 𝐁 = 𝟏 𝐇 𝐉 𝐉 S W 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 15

  16. Analysis of the State of the Art Example: Code-Offset Fuzzy Extractor (Dodis et al ., Eurocrypt 2004) ( n,k,d ) code with generator Matrix G 𝑠𝑏𝑜𝑙(𝐁 𝑀 ) = 𝑜 𝐁 𝑀 𝐁 𝑆 𝑠𝑏𝑜𝑙(𝐁 𝑆 ) = 𝑜 𝟏 𝐇 k 𝑠𝑏𝑜𝑙 𝐁 = 𝑜 + 𝑙 𝐉 𝐉 n Δ = 𝑠𝑏𝑜𝑙(𝐁 𝑀 ) + 𝑠𝑏𝑜𝑙(𝐁 𝑆 ) − 𝑠𝑏𝑜𝑙 𝐁 = 2𝑜 − 𝑜 + 𝑙 n n = 𝑜 − 𝑙 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 16

  17. Analysis of the State of the Art Example: Code-Offset Fuzzy Extractor Result consistent with previous work but easier to obtain (e.g. Delvaux et al. , CHES 2016) 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 17

  18. Analysis of the State of the Art Δ Approach Fuzzy Commitment (CCS 1999) 0 Code Offset Fuzzy Extractor (Eurocrypt 2004) n-k Syndrome Construction (Eurocrypt 2004) n-k Parity Construction (S&P 1998) 2k-n Systematic Low Leakage Coding (ASIACCS 2015) 0 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 18

  19. Take Home Message • Algebraic representation of key generation for PUFs • Rank loss enables first security check • Some state-of-the-art approaches enable zero leakage Long-term vision • Develop and characterize more complex approaches 20.08.2016 Algebraic Security Analysis of Key Generation with PUFs 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend