Side-Channel Analysis of PUFs and Fuzzy Extractors
- Cite this paper as:
- Merli D., Schuster D., Stumpf F., Sigl G. (2011) Side-Channel Analysis of PUFs and Fuzzy Extractors. In: McCune J.M., Balacheff B., Perrig A., Sadeghi AR., Sasse A., Beres Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg
Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated. For this purpose, we analysed the side-channel leakage of PUF architectures and fuzzy extractor implementations. We identified several attack vectors within common PUF constructions and introduce two side-channel attacks on fuzzy extractors. Our proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.
KeywordsPhysical Unclonable Function (PUF) Side-Channel Analysis (SCA) Fuzzy Extractor Helper Data FPGA
Unable to display preview. Download preview PDF.