Back to Search
Start Over
Analysis and Protection of the Two-Metric Helper Data Scheme
Analysis and Protection of the Two-Metric Helper Data Scheme
- Source :
- Constructive Side-Channel Analysis and Secure Design, Constructive Side-Channel Analysis and Secure Design, 12910, Springer International Publishing, pp.279-302, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-89915-8_13⟩, Constructive Side-Channel Analysis and Secure Design ISBN: 9783030899141, COSADE
- Publication Year :
- 2021
- Publisher :
- HAL CCSD, 2021.
-
Abstract
- International audience; To compensate for the poor reliability of Physical Unclonable Function (PUF) primitives, some low complexity solutions not requiring error-correcting codes (ECC) have been proposed. One simple method is to discard less reliable bits, which are indicated in the helper data stored inside the PUF. To avoid discarding bits, the Two-metric Helper Data (TMH) method, which particularly applies to oscillation-based PUFs, allows to keep all bits by using different metrics when deriving the PUF response. However, oscillation-based PUFs are sensitive to side-channel analysis (SCA) since the frequencies of the oscillations can be observed by current or electromagnetic measurements. This paper studies the security of PUFs using TMH in order to obtain both reliable and robust PUF responses. We show that PUFs using TMH are sensitive to SCA, but can be greatly improved by using temporal masking and adapted extraction metrics. In case of public helper data, an efficient protection requires the randomization of the measurement order. We study two different solutions, providing interesting insights into trade-offs between security and complexity.
- Subjects :
- Scheme (programming language)
[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]
LFSR-based Protection
Computer science
Permutation
Reliability (computer networking)
Physical unclonable function
02 engineering and technology
01 natural sciences
Low complexity
Two-metric Helper Data
Countermeasures
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
0103 physical sciences
0202 electrical engineering, electronic engineering, information engineering
[INFO]Computer Science [cs]
PUF
computer.programming_language
010302 applied physics
Auditory masking
Side-Channel Analysis
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
020202 computer hardware & architecture
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Metric (mathematics)
[INFO.INFO-ES]Computer Science [cs]/Embedded Systems
computer
Algorithm
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-030-89914-1
- ISBNs :
- 9783030899141
- Database :
- OpenAIRE
- Journal :
- Constructive Side-Channel Analysis and Secure Design, Constructive Side-Channel Analysis and Secure Design, 12910, Springer International Publishing, pp.279-302, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-89915-8_13⟩, Constructive Side-Channel Analysis and Secure Design ISBN: 9783030899141, COSADE
- Accession number :
- edsair.doi.dedup.....19a17ae8e682610ad59df29e3a4e587c
- Full Text :
- https://doi.org/10.1007/978-3-030-89915-8_13⟩