27
Physical Unclonable Functions Farzane Salehi Minapour Aida Miralaei MohammadKazem Taram Department of Computer Eng. Sharif University of Technology Spring 2014

Physical Unclonable Functions

  • Upload
    adah

  • View
    252

  • Download
    5

Embed Size (px)

DESCRIPTION

Physical Unclonable Functions. Farzane Salehi Minapour Aida Miralaei MohammadKazem Taram Department of Computer Eng. Sharif University of Technology Spring 2014. Agenda. Challenges in Hardware Security What is PUF ? Applications of PUFs Classification of PUFs PUF Circuits Summery - PowerPoint PPT Presentation

Citation preview

Page 1: Physical Unclonable Functions

Physical Unclonable Functions

Farzane Salehi MinapourAida MiralaeiMohammadKazem Taram

Department of Computer Eng. Sharif University of TechnologySpring 2014

Page 2: Physical Unclonable Functions

Agenda

●Challenges in Hardware Security●What is PUF ?●Applications of PUFs●Classification of PUFs●PUF Circuits●Summery●References

Hardware Security and Trust, CE, SUT

Page 3: Physical Unclonable Functions

Challenges=>Conventional Authentication

Hardware Security and Trust, CE, SUT

Conventional Authentication Schemes Need to store keys Power and area consuming

Page 4: Physical Unclonable Functions

.

Challenges => Store Secrets

Hardware Security and Trust, CE, SUT

Conventional approach to embed secure secrets in IC• Non-volatile memory(ROM, Fuse, Flash or EEPROM)• Battery-backed RAM

Non-volatile memory technologies are often vulnerable to invasive and non-invasive attack

Adversaries can physically extract secret keys from EEPROM while processor is off

Page 5: Physical Unclonable Functions

Challenges=>expensive tamper proof packs

Hardware Security and Trust, CE, SUT

Storing digital information in a device in a way that is resistant to physical attacks is difficult and expensive.

IBM 4758 ● Tamper-proof package containing

a secure processor which has a secret key and memory

● Tens of sensors, resistance, temperature, voltage, etc.

● Continually battery-powered● ~ $3500 for a 99 MHz processor

and 128MB of memory

Page 6: Physical Unclonable Functions

Power and Area are criticalRFID tag can afford a maximum of 2000 gates for security features

Passive RFIDsA good cryptographic primitive should be lightweight, occupy little area on silicon and should have very low power consumption.

Challenges=>Power and Area

Hardware Security and Trust, CE, SUT

Page 7: Physical Unclonable Functions

What is PUF? Physical Unclonable Function (PUF) Process variations can be turned into a

feature rather than a problem• Variation is inherent in fabrication process• Unique for each physical instance• Hard to remove or predict• Relative variation increases as the fab process

advances• Non-silicon PUFs

Hardware Security and Trust, CE, SUT

Page 8: Physical Unclonable Functions

Types of PUFs

● Optical PUFs● Coating and Acoustic PUFs● Silicon PUFs(SPUF)

○ timing and delay information○ easy integrate into ICs

Page 9: Physical Unclonable Functions

Applications of PUF1) Low cost authentication[1]

Hardware Security and Trust, CE, SUT

Page 10: Physical Unclonable Functions

Applications of PUF2) Cryptographic Key Generator[1]

*ECC=Error Correction Code Hardware Security and Trust, CE, SUT

Page 11: Physical Unclonable Functions

Applications of PUF3) Software Licensing and Anonymous Computation[3]

*CPUF=Controlled PUF Hardware Security and Trust, CE, SUT

Page 12: Physical Unclonable Functions

Applications of PUF3) Software Licensing and Anonymous Computation

Hardware Security and Trust, CE, SUT

Page 13: Physical Unclonable Functions

●0.1% of all challenges do not return a consistent response

●These meta-stable challenges generate responses which can vary unpredictably

Applications of PUF

4) Random Number Generation [2]

Page 14: Physical Unclonable Functions

Classification of PUFs●Strong PUFs

○Large number of challenge response pairs○IC identification and secret key generation○E.g arbiter PUF and feed forward arbiter

●Weak PUFs○Limited number of challenge response pairs

(sometime just single)○Secret key generation○E.g SRAM PUF and butterfly PUF

Hardware Security and Trust, CE, SUT

Page 15: Physical Unclonable Functions

PUF Circuits●Arbiter PUF[4]

Hardware Security and Trust, CE, SUT

Page 16: Physical Unclonable Functions

PUF Circuits

●Arbiter PUF●delay paths with the same layout length●Simple->attackers can construct a timing

model

Hardware Security and Trust, CE, SUT

Page 17: Physical Unclonable Functions

PUF Circuits●construct a k-bit response

●one circuit can be used k times with different inputs

● duplicate the single-output PUF circuit

Hardware Security and Trust, CE, SUT

Page 18: Physical Unclonable Functions

PUF Circuits●Feed Forward Arbiter PUF

Hardware Security and Trust, CE, SUT

Page 19: Physical Unclonable Functions

PUF Circuits●Lightweight Secure PUF[7]

Hardware Security and Trust, CE, SUT

Page 20: Physical Unclonable Functions

PUF Circuits●Ring Oscillator PUF [1]

Hardware Security and Trust, CE, SUT

Page 21: Physical Unclonable Functions

PUF Circuits

●Ring Oscillator PUF●Easier Implementation

●No need for careful layout and routing●Slower, Larger, more power to generate bits●Better for FPGAs and secure processors●Hard to generate many challenge response

pairs

Hardware Security and Trust, CE, SUT

Page 22: Physical Unclonable Functions

PUF Circuits●Ring Oscillator PUF

●environmental conditions●Choose ring oscillator

pairs, whose frequencies are far apart=>remove key generation error

Hardware Security and Trust, CE, SUT

Page 23: Physical Unclonable Functions

PUF Circuits SRAM●SRAM PUF[5]

Hardware Security and Trust, CE, SUT

Page 24: Physical Unclonable Functions

PUF Circuits●Butterfly PUF[6]

Hardware Security and Trust, CE, SUT

Page 25: Physical Unclonable Functions

Summery●PUFs are innovative circuit primitives that extract

secrets from physical characteristics of integrated circuits (ICs)

●PUFs can enable low-cost authentication of individual ICs

●Generate volatile secret keys for cryptographic operations both symmetric and asymmetric cryptographic operations

●PUF applications and circuits

Hardware Security and Trust, CE, SUT

Page 26: Physical Unclonable Functions

References[1] Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9{14. ACM Press, New York, NY, USA (2007)[2] C. W. O’Donnell, G. E. Suh, and S. Devadas . PUF-based random number generation. In MITCSAIL CSG Technical Memo 481, November 2004[3] Gassend, Blaise, et al. "Controlled physical random functions and applications." ACM Transactions on Information and System Security (TISSEC) 10.4 (2008): 3.[4]   J.W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk and S. Devadas, “ A technique  to build a secret key in integrated circuits with identification and authentication applications”, in Proceedings of the VLSI Circuits Symposium, June 2004. [5]    D. E. Holcomb, W. P. Burleson, and K. Fu, “  Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers”,  in  IEEE Transactions on Computers, 58(9):1198-1210, 2009.[6] S. S. Kumar, J. Guajardo, R. Maes, Geert-Jan Schrijen  and P. Tuyls,  “Extended Abstract: The Butterfly PUF Protecting IP on every FPGA”, in  IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008.[7] M. Majzoobi, F. Koushanfar and M. Potkonjak, “Lightweight Secure PUFs”, in IEEE International Conference on Computer-Aided Design, 2008

Hardware Security and Trust, CE, SUT

Page 27: Physical Unclonable Functions

Thanks