Abstract
Secure storage of cryptographic keys in hardware is an essential building block for high security applications. It has been demonstrated that Physically Unclonable Functions (PUFs) based on uninitialized SRAM are an effective way to securely store a key based on the unique physical characteristics of an Integrated Circuit (IC). The start-up state of an SRAM memory is unpredictable but not truly random as well as noisy, hence privacy amplification techniques and a Helper Data Algorithm (HDA) are required in order to recover the correct value of a full entropy secret key. At the core of an HDA are error correcting techniques. The best known method to recover a full entropy 128-bit key requires 4700 SRAM cells. Earlier work by Maes et al. has reduced the number of SRAM cells to 1536 by using soft decision decoding; however, this method requires multiple measurements (and thus also power resets) during the storage of a key, which will be shown to be an unacceptable overhead for many applications. This article demonstrates how soft decision decoding with only a single measurement during storage can reduce the required number of SRAM cells to 3900 (a 17% reduction) without increasing the size of en-/decoder. The number of SRAM cells can even be reduced to 2900 (a 38% reduction). This does increase cost of the decoder, but depending on design requirements it can be shown to be worthwhile. Therefore, it is possible to securely store a 128-bit key at a very low overhead in an IC or FPGA.
Chapter PDF
References
Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181–197. Springer, Heidelberg (2008)
Boyen, X.: Reusable Cryptographic Fuzzy Extractors. In: CCS 2004, pp. 82–91. ACM, New York (2004), http://doi.acm.org/10.1145/1030083.1030096
Claes, M., van der Leest, V., Braeken, A.: Comparison of SRAM and FF PUF in 65nm Technology. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 47–64. Springer, Heidelberg (2012)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon Physical Random Functions. In: CCS 2002, pp. 148–160. ACM, New York (2002), http://doi.acm.org/10.1145/586110.586132
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007)
Hackett, C.: An Efficient Algorithm for Soft-Decision Decoding of the (24, 12) Extended Golay Code. IEEE Transactions on Communications 29(6), 909–911 (1981)
Kumar, S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The Butterfly PUF Protecting IP on Every FPGA. In: Tehranipoor, M., Plusquellic, J. (eds.) IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 67–70. IEEE Computer Society (2008)
Lee, J., Lim, D., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. In: IEEE Symposium on VLSI Circuits 2004, pp. 176–179. IEEE (2004)
Linnartz, J.-P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. In: Workshop on Information and System Security (WISSec 2008), Eindhoven, NL, p. 17 (2008)
Maes, R., Tuyls, P., Verbauwhede, I.: Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 332–347. Springer, Heidelberg (2009)
Maes, R., Tuyls, P., Verbauwhede, I.: Soft Decision Helper Data Algorithm for SRAM PUFs. In: IEEE International Symposium on Information Theory (ISIT 2009), pp. 2101–2105. IEEE Press, Piscataway (2009)
Ravikanth, P.S.: Physical One-Way Functions. Ph.D. thesis (2001), aAI0803255
Simons, P., van der Sluis, E., van der Leest, V.: Buskeeper PUFs, a Promising Alternative to D Flip-Flop PUFs. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012), pp. 7–12, June 3-4 (2012), http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6224311&isnumber=6224308 , doi:10.1109/HST.2012.6224311
Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407–422. Springer, Heidelberg (2005)
Taiwan Semiconductor Manufacturing Company Limited (TSMC): 65nm technology overview, http://www.tsmc.com/english/dedicatedFoundry/technology/65nm.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 International Association for Cryptologic Research
About this paper
Cite this paper
van der Leest, V., Preneel, B., van der Sluis, E. (2012). Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment. In: Prouff, E., Schaumont, P. (eds) Cryptographic Hardware and Embedded Systems – CHES 2012. CHES 2012. Lecture Notes in Computer Science, vol 7428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33027-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-33027-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33026-1
Online ISBN: 978-3-642-33027-8
eBook Packages: Computer ScienceComputer Science (R0)