A Formalization of the Security Features of Physical Functions
Title | A Formalization of the Security Features of Physical Functions |
Publication Type | Conference Paper |
Year of Publication | 2011 |
Authors | Armknecht, F., Maes, R., Sadeghi, A, Standaert, O.-X., Wachsmann, C. |
Conference Name | Security and Privacy (SP), 2011 IEEE Symposium on |
Date Published | May |
Keywords | Adaptive optics, algorithmic solutions, anticounterfeiting schemes, block ciphers, context intrinsic physical properties, cryptographic constructions, cryptographic devices, cryptographic research, cryptography, erroneous computations, fault injection attacks, Formal Security Model, information leakage, information systems security, integrated circuits, Integrated optics, key generation algorithms, Manufacturing, Noise measurement, physical attacks, physical functions, physical unclonable functions, Physically Unclonable Function (PUF), Physics, PUF, quantification tools, Robustness, rudimentary security models, security features, side channels attacks, Unclonability, Unpredictability |
Abstract | Physical attacks against cryptographic devices typically take advantage of information leakage (e.g., side-channels attacks) or erroneous computations (e.g., fault injection attacks). Preventing or detecting these attacks has become a challenging task in modern cryptographic research. In this context intrinsic physical properties of integrated circuits, such as Physical(ly) Unclonable Functions (PUFs), can be used to complement classical cryptographic constructions, and to enhance the security of cryptographic devices. PUFs have recently been proposed for various applications, including anti-counterfeiting schemes, key generation algorithms, and in the design of block ciphers. However, currently only rudimentary security models for PUFs exist, limiting the confidence in the security claims of PUF-based security primitives. A useful model should at the same time (i) define the security properties of PUFs abstractly and naturally, allowing to design and formally analyze PUF-based security solutions, and (ii) provide practical quantification tools allowing engineers to evaluate PUF instantiations. In this paper, we present a formal foundation for security primitives based on PUFs. Our approach requires as little as possible from the physics and focuses more on the main properties at the heart of most published works on PUFs: robustness (generation of stable answers), unclonability (not provided by algorithmic solutions), and unpredictability. We first formally define these properties and then show that they can be achieved by previously introduced PUF instantiations. We stress that such a consolidating work allows for a meaningful security analysis of security primitives taking advantage of physical properties, becoming increasingly important in the development of the next generation secure information systems. |
URL | ieeexplore.ieee.org/document/5958042/ |
DOI | 10.1109/SP.2011.10 |
Citation Key | 5958042 |
- key generation algorithms
- Unpredictability
- Unclonability
- side channels attacks
- security features
- rudimentary security models
- Robustness
- quantification tools
- PUF
- Physics
- Physically Unclonable Function (PUF)
- physical unclonable functions
- physical functions
- physical attacks
- Noise measurement
- manufacturing
- Adaptive optics
- Integrated optics
- integrated circuits
- information systems security
- Information Leakage
- Formal Security Model
- fault injection attacks
- erroneous computations
- Cryptography
- cryptographic research
- cryptographic devices
- cryptographic constructions
- context intrinsic physical properties
- block ciphers
- anticounterfeiting schemes
- algorithmic solutions