Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Title | Locking Secret Data in the Vault Leveraging Fuzzy PUFs |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Chin, Paul, Cao, Yuan, Zhao, Xiaojin, Zhang, Leilei, Zhang, Fan |
Conference Name | 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) |
Date Published | dec |
Keywords | aging sensitivity, cryptography, data algorithms, DRAM chips, DRAM PUF, enrollment phase, error correction, error-correction algorithm, error-tolerant, Fuzzy Cryptography, fuzzy pattern, fuzzy PUF, fuzzy set theory, Hardware, helper data algorithm, Human Behavior, inherent sensitivity, locking secret data, low-cost security anchor, manufacturing variations, Metrics, nanoscale variations, pattern locks, Phase measurement, physical unclonable functions, prominent intrinsic PUF, Proposals, pubcrawl, Random access memory, reliability, Resiliency, Scalability, secret important data, secure environment, security scheme |
Abstract | Physical Unclonable Functions (PUFs) are considered as an attractive low-cost security anchor. The unique features of PUFs are dependent on the Nanoscale variations introduced during the manufacturing variations. Most PUFs exhibit an unreliability problem due to aging and inherent sensitivity to the environmental conditions. As a remedy to the reliability issue, helper data algorithms are used in practice. A helper data algorithm generates and stores the helper data in the enrollment phase in a secure environment. The generated helper data are used then for error correction, which can transform the unique feature of PUFs into a reproducible key. The key can be used to encrypt secret data in the security scheme. In contrast, this work shows that the fuzzy PUFs can be used to secret important data directly by an error-tolerant protocol without the enrollment phase and error-correction algorithm. In our proposal, the secret data is locked in a vault leveraging the unique fuzzy pattern of PUF. Although the noise exists, the data can then be released only by this unique PUF. The evaluation was performed on the most prominent intrinsic PUF - DRAM PUF. The test results demonstrate that our proposal can reach an acceptable reconstruction rate in various environment. Finally, the security analysis of the new proposal is discussed. |
DOI | 10.1109/AsianHOST47458.2019.9006716 |
Citation Key | chin_locking_2019 |
- physical unclonable functions
- Human behavior
- inherent sensitivity
- locking secret data
- low-cost security anchor
- manufacturing variations
- nanoscale variations
- pattern locks
- Phase measurement
- helper data algorithm
- prominent intrinsic PUF
- Proposals
- pubcrawl
- Random access memory
- Reliability
- secret important data
- secure environment
- security scheme
- enrollment phase
- Resiliency
- Metrics
- Fuzzy Cryptography
- aging sensitivity
- Cryptography
- data algorithms
- DRAM chips
- DRAM PUF
- Scalability
- error correction
- error-correction algorithm
- error-tolerant
- fuzzy pattern
- fuzzy PUF
- fuzzy set theory
- Hardware