International Conference on the Theory and Application of Cryptology and Information Security

ASIACRYPT 2009: Advances in Cryptology – ASIACRYPT 2009 pp 685-702

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

  • Frederik Armknecht
  • Roel Maes
  • Ahmad-Reza Sadeghi
  • Berk Sunar
  • Pim Tuyls
Conference paper

DOI: 10.1007/978-3-642-10366-7_40

Volume 5912 of the book series Lecture Notes in Computer Science (LNCS)

Abstract

Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels.

Physically Unclonable Functions (PUFs) represent a promising new technology that allows to store secrets in a tamper-evident and unclonable manner. PUFs enjoy their security from physical structures at submicron level and are very useful primitives to protect against memory attacks.

In this paper we aim at making the first step towards combining and binding algorithmic properties of cryptographic schemes with physical structure of the underlying hardware by means of PUFs. We introduce a new cryptographic primitive based on PUFs, which we call PUF-PRFs. These primitives can be used as a source of randomness like pseudorandom functions (PRFs). We construct a block cipher based on PUF-PRFs that allows simultaneous protection against algorithmic and physical attackers, in particular against memory attacks. While PUF-PRFs in general differ in some aspects from traditional PRFs, we show a concrete instantiation based on established SRAM technology that closes these gaps.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Frederik Armknecht
    • 1
  • Roel Maes
    • 2
  • Ahmad-Reza Sadeghi
    • 1
  • Berk Sunar
    • 3
  • Pim Tuyls
    • 2
    • 4
  1. 1.Horst Görtz Institute for IT SecurityRuhr-University BochumGermany
  2. 2.ESAT/COSIC and IBBTCatholic University of LeuvenBelgium
  3. 3.Cryptography & Information Security, WPIUSA
  4. 4.Intrinsic IDEindhovenThe Netherlands