Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 369–383Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
Read-Proof Hardware from Protective Coatings

Read-Proof Hardware from Protective Coatings

  • Pim Tuyls18,
  • Geert-Jan Schrijen18,
  • Boris Škorić18,
  • Jan van Geloven18,
  • Nynke Verhaegh18 &
  • …
  • Rob Wolters18 
  • Conference paper
  • 4165 Accesses

  • 203 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In order to limit the attacker’s ability to read out secret information, the concept of Algorithmic Tamper Proof (ATP) security is needed as put forth by Gennaro, Lysyanskaya, Malkin, Micali and Rabin. An essential component to achieve ATP security is read-proof hardware. In this paper, we develop an implementation of read-proof hardware that is resistant against invasive attacks. The construction is based on a hardware and a cryptographic part. The hardware consists of a protective coating that contains a lot of randomness. By performing measurements on the coating a fingerprint is derived. The cryptographic part consists of a Fuzzy Extractor that turns this fingerprint into a secure key. Hence no key is present in the non-volatile memory of the device. It is only constructed at the time when needed, and deleted afterwards. A practical implementation of the hardware and the cryptographic part is given. Finally, experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key.

Keywords

  • Protective Coating
  • Gray Code
  • Physical Unclonable Function
  • Honest Party
  • Helper Data

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic Tamper-Proof Security: Theoretical Foundations for Security against Hardware Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258–277. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  2. Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  3. Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  4. Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Crypto Systems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)

    Google Scholar 

  5. Škorić, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of coating PUFs. Journal of Applied Physics(accepted for publication), http://eprint.iacr.org/2006/101

  6. Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.: Generalized Privacy Amplification. IEEE Transactions on Information Theory 41(6), 1915–1923 (1995)

    CrossRef  MATH  MathSciNet  Google Scholar 

  7. Bar-El, H.: Known Attacks Against Smartcards, Discretix Technologies Ltd., http://www.infosecwriters.com/text_resources/pdf/Known_Attacks_Against_Smartcards.pdf

  8. Dodis, Y., Reyzin, M., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  9. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: 6th ACM Conference on Computer and Communication Security, pp. 28–36 (1999)

    Google Scholar 

  10. Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  11. Pappu, R.: Physical One-way functions, Ph.D. thesis. MIT (2001)

    Google Scholar 

  12. Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-way functions. Science 297, 2026–2030 (2002)

    CrossRef  Google Scholar 

  13. Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science 4(7) (1998)

    Google Scholar 

  14. Kamendje, G.A., Posch, R.: Intrusion aware CMOS Random Pattern Generator for Cryptographic Applications. In: Rossler, P., Dorderlein, A. (eds.) Proceedings of Austrochip 2001, Vienna, Austria (October 12, 2001) ISBN 3-9501517-0-2

    Google Scholar 

  15. Smartec, Universal Transducer Interface evaluation board, Specifications v3.0, http://www.smartec.nl/pdf/Dsuti.pdf

  16. Tuyls, P., Batina, L.: RFID tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  17. Tuyls, P., Škorić, B.: Secret Key Generation from Classical Physics. In: Mukherjee, et al. (eds.) AmIware, Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, pp. 421–447. Kluwer, Dordrecht (2005)

    Google Scholar 

  18. Ignatenko, T., Schrijen, G.J., Škorić, B., Tuyls, P., Willems, F.: Estimating the Secrecy-Rate of Physical Uncloneable Functions with the Context-Tree Weighting Method, accepted at ISIT 2006 (2006)

    Google Scholar 

  19. Witteman, M.: Smart card security analysis. In: IPA Spring Days on Security, Kapellerput, Heeze, April 18-20 (2001), http://www.win.tue.nl/ipa/archive/springdays2001/witteman.ppt

  20. Witteman, M.: Advances in Smartcard Security. In: Information Security Bulletin, July 2002, pp.11–22 (2002), http://www.riscure.com/articles/ISB0707MW.pdf

  21. Yang, J., Gao, L., Zhang, Y.: Improving Memory Encryption Performance in Secure Processors. IEEE. Trans. Computers 53(5), 1–11 (2005)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Philips Research Laboratories, The Netherlands

    Pim Tuyls, Geert-Jan Schrijen, Boris Škorić, Jan van Geloven, Nynke Verhaegh & Rob Wolters

Authors
  1. Pim Tuyls
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Geert-Jan Schrijen
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Boris Škorić
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Jan van Geloven
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Nynke Verhaegh
    View author publications

    You can also search for this author in PubMed Google Scholar

  6. Rob Wolters
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tuyls, P., Schrijen, GJ., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R. (2006). Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_29

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature