formalism to assess the
play

"Formalism to Assess the Entropy and Reliability of Loop - PowerPoint PPT Presentation

CRYPTARCHI 2017 Smolenice "Formalism to Assess the Entropy and Reliability of Loop PUF" Jean-Luc Danger 1,2 Olivier Rioul 1 Sylvain Guilley 1,2 Alexander Schaub 1 1 Tlcom ParisTech, LTCI, UPSAY 2 Secure-IC Page 1


  1. CRYPTARCHI 2017 Smolenice "Formalism to Assess the Entropy and Reliability of Loop PUF" Jean-Luc Danger 1,2 Olivier Rioul 1 Sylvain Guilley 1,2 Alexander Schaub 1 1 Télécom ParisTech, LTCI, UPSAY 2 Secure-IC Page 1 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  2. Outline  Loop PUF architecture  Entropy assessment  Reliability assessment  Results on real silicon  Conclusions * Depends on algorithm, not implementation Page 2 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  3. Loop PUF architecture Page 3 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  4. Operating Mode The information for each challenge is D Sign = identifier Module = reliability Page 4 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  5. Balance of Delay Elements in ASIC duplication Page 5 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  6. Balance of Delay Elements in FPGA Cluster 2 Cluster N Cluster 1 duplication N duplications Page 6 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  7. Delay measurement Page 7 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  8. Entropy  For a n-delay LPUF  If challenge = Hadamard codeword of n bits => Entropy = n * * Rioul, O., Solé, P ., Guilley, S., & Danger, J. L. (2016, July). On the Entropy of Physically Unclonable Functions. In Information Theory (ISIT), 2016 IEEE International Symposium on (pp. 2928-2932). IEEE. Page 8 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  9. Entropy with more than n challenges Page 9 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  10. LPUF reliability With Page 10 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  11. LPUF reliability The Reliability is not enough ~10 -3 even with high SNR => Needs of secure sketch : Error Correcting codes and Helper data Page 11 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  12. Reliability enhancement by delay knowledge Bit unreliable  |delay| < Th Th= W s The bits in the unreliable area "B" are discarded The helper data indicates the unreliable bits Page 12 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  13. New BER with filtered bits Page 13 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  14. Entropy after bit filtering Number of delay elements to reach n bits of entropy with Hadamard codes Page 14 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  15. Results on real silicon  n=54 cells, 65nm technology Page 15 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  16. i..i.d. check Correlation matrix on the 64 elements of the 49 PUFs No correlation between the 64 delay elements => entropy ~ 64 with Hadamard codes Page 16 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  17. Impact of the measurement window on the SNR SNR ~60 for log 2 L=14 Page 17 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  18. Entropy Page 18 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  19. Reliability: BER results Page 19 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  20. Conclusions  The Entropy of the Loop PUF can be formally obtained if Hadamard codes are used: N=Number of challenges  Entropy = number of delay elements n  The entropy increases non linearly if M > n  The reliability of the Loop PUF is low (BER ~10 -3 )  It can be easily improved by exploiting the delay knowledge  The unreliable bits are discarded  BER can go down 10 -9  But more bits are needed to reach the same entropy Page 20 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

  21. THANK YOU FOR YOUR ATTENTION Page 21 Télécom-ParisTech Jean-Luc Danger CRYPTARCHI 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend