New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions

Authors

  • Vincent Immler Fraunhofer Institute for Applied and Integrated Security (AISEC)
  • Karthik Uppund Fraunhofer Institute for Applied and Integrated Security (AISEC)

DOI:

https://doi.org/10.13154/tches.v2019.i3.30-65

Keywords:

Tamper-sensitivity, Physical Unclonable Function (PUF), Fuzzy Extractor, Information Theory, Higher-Order Alphabet PUF (HOA PUF), Lee Metric

Abstract

Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for secure storage of cryptographic keys and tamper-detection. Unfortunately, previously published PUF-based key derivation schemes do not sufficiently take into account the specifics of the underlying application, i.e., an attacker that tampers with the physical parameters of the PUF outside of an idealized noise error model. This is a notable extension of existing schemes for PUF key derivation, as they are typically concerned about helper data leakage, i.e., by how much the PUF’s entropy is diminished when gaining access to its helper data.
To address the specifics of tamper-evident PUFs, we formalize the aspect of tamper-sensitivity, thereby providing a new tool to rate by how much an attacker is allowed to tamper with the PUF. This complements existing criteria such as effective number of secret bits for entropy and failure rate for reliability. As a result, it provides a fair comparison among different schemes and independent of the PUF implementation, as its unit is based on the noise standard deviation of the underlying PUF measurement. To overcome the limitations of previous schemes, we then propose an Error-Correcting Code (ECC) based on the Lee metric, i.e., a distance metric well-suited to describe the distance between q-ary symbols as output from an equidistant quantization, i.e., a higher-order alphabet PUF. This novel approach is required, as the underlying symbols’ bits are not i.i.d. which hinders applying previous state-of-the-art approaches. We present the concept for our scheme and demonstrate its feasibility based on an empirical PUF distribution. The benefits of our approach are an increase by over 21% in effective secret bit compared to previous approaches based on equidistant quantization. At the same time, we improve tamper-sensitivity compared to an equiprobable quantization while ensuring similar reliability and entropy. Hence, this work opens up a new direction of how to interpret the PUF output and details a practically relevant scheme outperforming all previous constructions.

Published

2019-05-09

Issue

Section

Articles

How to Cite

New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions. (2019). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(3), 30-65. https://doi.org/10.13154/tches.v2019.i3.30-65