Advertisement

Grey-Box Cryptography: Physical Unclonable Functions

  • Pim Tuyls
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4357)

Abstract

Cryptography is a fundamental component of any information security infrastructure. It allows two parties, a sender and a receiver, to exchange messages in a secure and authentic way. For this goal the parties use a publicly known algorithm that depends on a secret key. The main assumption in cryptography is that the honest parties have some secure hardware containing the secret key. This is the so-called black-box model. Within this model, cryptography has developed many useful secure algorithms and protocols. The security level of these algorithms is well understood. It can for instance be guaranteed that mathematical attacks are very difficult. This difficulty is even made precise in terms of a security parameter. When the black-box assumption does not hold however, the security guarantees provided by cryptography do not hold anymore.

Keywords

Physical Attack Biometric Template Physical Unclonable Function Security Guarantee Fuzzy Extractor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258–277. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 238–250. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Skoric, B., van Geloven, J., Verhaegh, R., Tuyls, P., Schrijen, G.J., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369–383. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Pim Tuyls
    • 1
  1. 1.Philips Research LaboratoriesEindhovenThe Netherlands

Personalised recommendations