Efficient Helper Data Key Extractor on FPGAs

  • Christoph Bösch
  • Jorge Guajardo
  • Ahmad-Reza Sadeghi
  • Jamshid Shokrollahi
  • Pim Tuyls
Conference paper

DOI: 10.1007/978-3-540-85053-3_12

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5154)
Cite this paper as:
Bösch C., Guajardo J., Sadeghi AR., Shokrollahi J., Tuyls P. (2008) Efficient Helper Data Key Extractor on FPGAs. In: Oswald E., Rohatgi P. (eds) Cryptographic Hardware and Embedded Systems – CHES 2008. CHES 2008. Lecture Notes in Computer Science, vol 5154. Springer, Berlin, Heidelberg

Abstract

Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related applications. Due to their inherent dependency on the physical properties of the device that contains them, they can be used to uniquely bind an application to a particular device for the purpose of IP protection. This is crucial for the protection of FPGA applications against illegal copying and distribution. In order to exploit the physical nature of PUFs for reliable cryptography a so-called helper data algorithm or fuzzy extractor is used to generate cryptographic keys with appropriate entropy from noisy and non-uniform random PUF responses. In this paper we present for the first time efficient implementations of fuzzy extractors on FPGAs where the efficiency is measured in terms of required hardware resources. This fills the gap of the missing building block for a full FPGA IP protection solution. Moreover, in this context we propose new architectures for the decoders of Reed-Muller and Golay codes, and show that our solutions are very attractive from both the area and error correction capability points of view.

Keywords

Physical Unclonable Functions Intrinsic PUF Fuzzy Extractor Helper Data Algorithm FPGAs Implementation 
Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Christoph Bösch
    • 1
  • Jorge Guajardo
    • 2
  • Ahmad-Reza Sadeghi
    • 1
  • Jamshid Shokrollahi
    • 1
  • Pim Tuyls
    • 2
  1. 1.Horst-Görtz-Institute for IT-SecurityRuhr-University BochumGermany
  2. 2.Philips Research EuropeEindhovenThe Netherlands

Personalised recommendations