论文标题

基于内存的PUF设备的模糊提取器中SCA漏洞的早期RTL分析

Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

论文作者

Lai, Xinhui, Jenihhin, Maksim, Selimis, Georgios, Goossens, Sven, Maes, Roel, Paul, Kolin

论文摘要

由于能够有效利用制造过程中的内在可变性,因此在加密社区中,身体上的不可吻合功能(PUF)正在引起关注。但是,这意味着它们是嘈杂的设备,并且需要使用模糊提取器(FES),需要使用误差校正机制。最近的作品表明,如果不采取对策,则将FES应用于错误校正可能会使PUF破坏PUF。在本文中,我们介绍了对FES硬件实现的攻击模型,并为早期识别定时侧通道攻击(SCA)漏洞提供了解决方案,该漏洞可以通过物理故障注入来利用。这项工作的重要性源于以下事实:FES是支持PUF设备的实施中的重要组成部分。在误差校正过程中,通过正时侧通道泄漏的信息可以揭示FE输入数据,从而危及揭示秘密。因此,在RTL设计期间,在过程的早期确定潜在的泄漏非常重要。基于对具有FES的PUF设备的几种Bose-Chaudhuri-Hocquhem(BCH)和芦苇 - 固体解码器的RTL分析的实验结果证明了该方法的可行性。

Physical Unclonable Functions (PUFs) are gaining attention in the cryptography community because of the ability to efficiently harness the intrinsic variability in the manufacturing process. However, this means that they are noisy devices and require error correction mechanisms, e.g., by employing Fuzzy Extractors (FEs). Recent works demonstrated that applying FEs for error correction may enable new opportunities to break the PUFs if no countermeasures are taken. In this paper, we address an attack model on FEs hardware implementations and provide a solution for early identification of the timing Side-Channel Attack (SCA) vulnerabilities which can be exploited by physical fault injection. The significance of this work stems from the fact that FEs are an essential building block in the implementations of PUF-enabled devices. The information leaked through the timing side-channel during the error correction process can reveal the FE input data and thereby can endanger revealing secrets. Therefore, it is very important to identify the potential leakages early in the process during RTL design. Experimental results based on RTL analysis of several Bose-Chaudhuri-Hocquenghem (BCH) and Reed-Solomon decoders for PUF-enabled devices with FEs demonstrate the feasibility of the proposed methodology.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源