Error Correction for Physical Unclonable Functions Using Generalized - - PowerPoint PPT Presentation

error correction for physical unclonable functions using
SMART_READER_LITE
LIVE PREVIEW

Error Correction for Physical Unclonable Functions Using Generalized - - PowerPoint PPT Presentation

Ulm University Communications Engineering Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes uelich , Sven Puchinger , Martin Bossert , Sven M Matthias Hiller , Georg Sigl Institute


slide-1
SLIDE 1

Ulm University Communications Engineering

Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes

Sven M¨ uelich∗, Sven Puchinger∗, Martin Bossert∗, Matthias Hiller⋄, Georg Sigl⋄

∗Institute of Communications Engineering, Ulm University, Germany ⋄Institute for Security in Information Technology, TU Munich, Germany

ITG Fachgruppe ”Angewandte Informationstheorie” Munich, October 9, 2014

Sven M¨ uelich Error Correction for Physical Unclonable Functions 1

slide-2
SLIDE 2

Ulm University Communications Engineering

Outline

A

NACHRICHTENTECHNIK

1

Motivation

2

Physical Unclonable Functions (PUFs)

3

Example Code Construction

4

Conclusion

Sven M¨ uelich Error Correction for Physical Unclonable Functions 2

slide-3
SLIDE 3

Ulm University Communications Engineering

Motivation

A

NACHRICHTENTECHNIK

Challenges when implementing a cryptosystem: Secure key generation

Random, unique and unpredictable keys Satisfying these properties is hard to achieve

Secure key storage

Key bits in a non-volatile memory Adversaries can gain physical access to (protected) memories

Physical Unclonable Functions (PUFs) can be used to realize secure key generation and secure key storage

Sven M¨ uelich Error Correction for Physical Unclonable Functions 4

slide-4
SLIDE 4

Ulm University Communications Engineering

Physical Unclonable Functions (PUFs)

A

NACHRICHTENTECHNIK

What is a PUF? Physical entity with challenge-response behavior Properties:

Uniqueness Reproducibility

10111001 PUF1 0 1 1 1 0 0 1 1 10111001 PUF2 1 0 0 1 1 1 0 1 Uniqueness 10111001 PUF1 0 1 1 1 0 0 1 1 10111001 PUF1 0 1 1 0 1 0 1 1 Reproducibility

Sven M¨ uelich Error Correction for Physical Unclonable Functions 6

slide-5
SLIDE 5

Ulm University Communications Engineering

Physical Unclonable Functions (PUFs)

A

NACHRICHTENTECHNIK

1 2 3 4 5 m

1 1 1 · · ·

1 2 3 4 5 m

1 1 1

Example: SRAM PUFs device with memory cells random initialization when powering on randomness static over lifetime Challenge: Subset of memory cells Response: Values in selected memory cells

Sven M¨ uelich Error Correction for Physical Unclonable Functions 7

slide-6
SLIDE 6

Ulm University Communications Engineering

Physical Unclonable Functions (PUFs)

A

NACHRICHTENTECHNIK

Why coding theory? Responses are not perfectly reproducible and hence cannot be used as key directly

PUF r′ = c + e + e′ Sketch Function r = c + e e Helper Data Storage e Recover Function ˆ r = ˆ c + e Hash Key

Sven M¨ uelich Error Correction for Physical Unclonable Functions 8

slide-7
SLIDE 7

Ulm University Communications Engineering

Example Code construction

A

NACHRICHTENTECHNIK

Challenge: Find good codes for Secure Sketches Constraints: Time and area consumption Binary codes Dimension ≥ key length Codelength as small as possible

Sven M¨ uelich Error Correction for Physical Unclonable Functions 10

slide-8
SLIDE 8

Ulm University Communications Engineering

Example Code construction

A

NACHRICHTENTECHNIK

Existing scheme given in [Maes2012]1: Binary Symmetric Channel with p = 0.14 Generate 128 bit key with block error probability Perr = 10−9 Concatenation of (318, 174, 35) BCH code and (7, 1, 7) code What is our goal? Generate 128 bit key with block error probability Perr < 10−9 Improve existing scheme in

Codelength Block error probability Simple implementation

  • 1R. Maes, A. Herrewege, I. Verbauwhede, ”PUFKY: A Fully Functional

PUF-Based Cryptographic Key Generator”, CHES, 2012

Sven M¨ uelich Error Correction for Physical Unclonable Functions 11

slide-9
SLIDE 9

Ulm University Communications Engineering

Reed-Muller Example Code Construction

A

NACHRICHTENTECHNIK

Partitioning:

. . . . . . . . . . . . Level 1 Level 2 Level 3 ← − A(1)(128, 8, 64) ← − A(2)(128, 99, 8) B(1)(16, 5, 8) B(2)

0000(16, 1, 16)

B(3)

0000,0

B(3)

0000,1

1 0000 B(2)

1111(16, 1, 16)

B(3)

1111,0

B(3)

1111,1

1 1111

Sven M¨ uelich Error Correction for Physical Unclonable Functions 12

slide-10
SLIDE 10

Ulm University Communications Engineering

Reed-Muller Example Code Construction

A

NACHRICHTENTECHNIK

Used decoding methods: Generalized Concatenated Codes (GC Codes) RM Error Erasure Decoding Generalized Minimum Distance (GMD) Decoding

Sven M¨ uelich Error Correction for Physical Unclonable Functions 13

slide-11
SLIDE 11

Ulm University Communications Engineering

Conclusion

A

NACHRICHTENTECHNIK

How good is our code construction? Code Perr Length Largest Field [Maes2012] ≈ 10−9 2226 F28 (BCH) New ≈ 5.37 · 10−10 2048 F2

Sven M¨ uelich Error Correction for Physical Unclonable Functions 15

slide-12
SLIDE 12

Ulm University Communications Engineering

Thank you for your attention.

Sven M¨ uelich Error Correction for Physical Unclonable Functions 16