Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels.
Physically Unclonable Functions (PUFs) represent a promising new technology that allows to store secrets in a tamper-evident and unclonable manner. PUFs enjoy their security from physical structures at submicron level and are very useful primitives to protect against memory attacks.
In this paper we aim at making the first step towards combining and binding algorithmic properties of cryptographic schemes with physical structure of the underlying hardware by means of PUFs. We introduce a new cryptographic primitive based on PUFs, which we call PUF-PRFs. These primitives can be used as a source of randomness like pseudorandom functions (PRFs). We construct a block cipher based on PUF-PRFs that allows simultaneous protection against algorithmic and physical attackers, in particular against memory attacks. While PUF-PRFs in general differ in some aspects from traditional PRFs, we show a concrete instantiation based on established SRAM technology that closes these gaps.
- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
- Book Title
- Advances in Cryptology – ASIACRYPT 2009
- Book Subtitle
- 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
- pp 685-702
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
- Mitsuru Matsui (16)
- Editor Affiliations
- 16. Information Technology R&D Center, Mitsubishi Electric Corporation
- Author Affiliations
- 17. Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany
- 18. ESAT/COSIC and IBBT, Catholic University of Leuven, Belgium
- 19. Cryptography & Information Security, WPI, MA, USA
- 20. Intrinsic ID, Eindhoven, The Netherlands
To view the rest of this content please follow the download PDF link above.