Protocol attacks on advanced PUF protocols and countermeasures

M. Van Dijk, U. Rührmair

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

In recent years, PUF-based schemes have not only been suggested for the basic security tasks of tamper sensitive key storage or system identification, but also for more complex cryptographic protocols like oblivious transfer (OT), bit commitment (BC), or key exchange (KE). These more complex protocols are secure against adversaries in the stand-alone, good PUF model. In this survey, a shortened version of [17], we explain the stronger bad PUF model and PUF re-use model. We argue why these stronger attack models are realistic, and that existing protocols, if used in practice, will need to face these. One consequence is that the design of advanced cryptographic PUF protocols needs to be strongly reconsidered. It suggests that Strong PUFs require additional hardware properties in order to be broadly usable in such protocols: Firstly, they should ideally be erasable, meaning that single PUF-responses can be erased without affecting other responses. If the area efficient implementation of this feature turns out to be difficult, new forms of Controlled PUFs [3] (such as Logically Erasable and Logically Reconfigurable PUFs [6]) may suffice in certain applications. Secondly, PUFs should be certifiable, meaning that one can verify that the PUF has been produced faithfully and has not been manipulated in any way afterwards. The combined implementation of these features represents a pressing and challenging problem for the PUF hardware community. © 2014 EDAA.
Original languageEnglish
Title of host publicationProceedings - Design, Automation and Test in Europe, DATE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9783981537024
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event17th Design, Automation and Test in Europe, DATE 2014 - , Germany
Duration: 24 Mar 201428 Mar 2014

Publication series

NameProceedings -Design, Automation and Test in Europe, DATE
ISSN (Print)1530-1591

Conference

Conference17th Design, Automation and Test in Europe, DATE 2014
Country/TerritoryGermany
Period24/03/1428/03/14

Fingerprint

Dive into the research topics of 'Protocol attacks on advanced PUF protocols and countermeasures'. Together they form a unique fingerprint.

Cite this