Visible to the public A Formalization of the Security Features of Physical Functions

TitleA Formalization of the Security Features of Physical Functions
Publication TypeConference Paper
Year of Publication2011
AuthorsArmknecht, F., Maes, R., Sadeghi, A, Standaert, O.-X., Wachsmann, C.
Conference NameSecurity and Privacy (SP), 2011 IEEE Symposium on
Date PublishedMay
KeywordsAdaptive optics, algorithmic solutions, anticounterfeiting schemes, block ciphers, context intrinsic physical properties, cryptographic constructions, cryptographic devices, cryptographic research, cryptography, erroneous computations, fault injection attacks, Formal Security Model, information leakage, information systems security, integrated circuits, Integrated optics, key generation algorithms, Manufacturing, Noise measurement, physical attacks, physical functions, physical unclonable functions, Physically Unclonable Function (PUF), Physics, PUF, quantification tools, Robustness, rudimentary security models, security features, side channels attacks, Unclonability, Unpredictability
Abstract

Physical attacks against cryptographic devices typically take advantage of information leakage (e.g., side-channels attacks) or erroneous computations (e.g., fault injection attacks). Preventing or detecting these attacks has become a challenging task in modern cryptographic research. In this context intrinsic physical properties of integrated circuits, such as Physical(ly) Unclonable Functions (PUFs), can be used to complement classical cryptographic constructions, and to enhance the security of cryptographic devices. PUFs have recently been proposed for various applications, including anti-counterfeiting schemes, key generation algorithms, and in the design of block ciphers. However, currently only rudimentary security models for PUFs exist, limiting the confidence in the security claims of PUF-based security primitives. A useful model should at the same time (i) define the security properties of PUFs abstractly and naturally, allowing to design and formally analyze PUF-based security solutions, and (ii) provide practical quantification tools allowing engineers to evaluate PUF instantiations. In this paper, we present a formal foundation for security primitives based on PUFs. Our approach requires as little as possible from the physics and focuses more on the main properties at the heart of most published works on PUFs: robustness (generation of stable answers), unclonability (not provided by algorithmic solutions), and unpredictability. We first formally define these properties and then show that they can be achieved by previously introduced PUF instantiations. We stress that such a consolidating work allows for a meaningful security analysis of security primitives taking advantage of physical properties, becoming increasingly important in the development of the next generation secure information systems.

URLieeexplore.ieee.org/document/5958042/
DOI10.1109/SP.2011.10
Citation Key5958042