Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP International Conference on Communications and Multimedia Security

CMS 2012: Communications and Multimedia Security pp 26–38Cite as

  1. Home
  2. Communications and Multimedia Security
  3. Conference paper
Security Analysis of Image-Based PUFs for Anti-counterfeiting

Security Analysis of Image-Based PUFs for Anti-counterfeiting

  • Saloomeh Shariati18,
  • François Koeune18 &
  • François-Xavier Standaert18 
  • Conference paper
  • 1012 Accesses

  • 4 Citations

  • 3 Altmetric

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7394)

Abstract

Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet, as with any security system, it is important to embed them in a sound protocol, ensuring that no unexpected weakness is present in the “mortar” binding the components together. This paper proposes an anti-counterfeiting protocol that provably reduces to natural properties of its underlying components, namely an image-based Physical Function System bearing physical unclonability and an existentially unforgeable signature scheme. Experiments confirm the practical feasibility of our construction.

Keywords

  • Signature Scheme
  • Security Property
  • Equal Error Rate
  • Very Large Scale Integration
  • False Acceptance Rate

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Staake, T., Fleisch, E.: Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox, 1st edn. Springer Publishing Company, Incorporated (2010)

    Google Scholar 

  2. Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. on Components and Packaging Tech. 25, 175–176 (2002)

    CrossRef  Google Scholar 

  3. Chong, C.N., et al.: Anti-counterfeiting with a random pattern. In: Int. Conf. on Emerging Security Information, Systems and Tech., pp. 146–153 (2008)

    Google Scholar 

  4. Pappu, R.: Physical one-way functions. PhD thesis, MIT (March 2001)

    Google Scholar 

  5. Pappu, R., et al.: Physical one-way functions. Science 297 (2002)

    Google Scholar 

  6. Shariati, S., Standaert, F.-X., Jacques, L., Macq, B.: Comprehensive study of image-based physical function system. Submitted to Journal of Cryptographic Engineering

    Google Scholar 

  7. Tuyls, P., Škorić, B.: Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp. 133–148 (2007)

    Google Scholar 

  8. Tuyls, P., et al.: Secure key storage and anti-counterfeiting, pp. 255–268. Springer (2008)

    Google Scholar 

  9. Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  10. Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to Strongly Link Data and its Medium: the Paper Case. IET Information Security 4(2), 125–136 (2010)

    CrossRef  Google Scholar 

  11. Kirovski, D.: Anti-counterfeiting: Mixing the physical and the digital world. In: Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery-Resilient Cryptographic Hardware, vol. 09282 in Dagstuhl Seminar Proceedings (2010)

    Google Scholar 

  12. Buchanan, J.D.R., Cowburn, R.P., Jausovec, A.V., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Fingerprinting documents and packaging. Nature, 475 (2005)

    Google Scholar 

  13. Kirovski, D.: Toward an automated verification of certificates of authenticity. In: Proceedings of the 5th ACM Conference on Electronic Commerce, EC 2004, pp. 160–169. ACM (2004)

    Google Scholar 

  14. Chen, Y., Mihçak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch. 5, 29–37 (2005)

    CrossRef  Google Scholar 

  15. Chong, C.N., Jiang, D.: Anti-counterfeiting using phosphor puf. In: International Conference on In Anti-Counterfeiting, pp. 59–62 (2008)

    Google Scholar 

  16. Shariati, S., Standaert, F.-X., Jacques, L., Macq, B., Salhi, M.A., Antoine, P.: Random profiles of laser marks. In: WIC Symposium on Information Theory in the Benelux, pp. 27–34 (2010)

    Google Scholar 

  17. Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397–412 (2011)

    Google Scholar 

  18. Bauder, D.W.: An anti-counterfeiting concept for currency systems. Technical Report PTK-11990, Sandia National Labs, Albuquerque, NM (1983)

    Google Scholar 

  19. Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press (1993)

    Google Scholar 

  20. Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369–383. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  21. Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (November 2002)

    Google Scholar 

  22. Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200–1205 (2005)

    CrossRef  Google Scholar 

  23. Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176–179 (2004)

    Google Scholar 

  24. Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007)

    CrossRef  Google Scholar 

  25. Shariati, S., Jacques, L., Standaert, F.-X., Macq, B., Salhi, M.A., Antoine, P.: Randomly driven fuzzy key extraction of uncloneable images. In: International Conference on Image Processing, ICIP (2010)

    Google Scholar 

  26. Tuyls, P., Skoric, B.: Secret key generation from classical physics. Philips Research Book Series (2005)

    Google Scholar 

  27. Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407–422. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  28. Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on VLSI Systems 13(10), 1200–1205 (2005)

    CrossRef  Google Scholar 

  29. Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685–702. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  30. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  31. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC Press (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. ICTEAM Institute, Electrical Engineering Department, Université Catholique de Louvain, Place du Levant, 3, B-1348, Louvain-la-Neuve, Belgium

    Saloomeh Shariati, François Koeune & François-Xavier Standaert

Authors
  1. Saloomeh Shariati
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. François Koeune
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. François-Xavier Standaert
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science, IBBT-DistriNet, K.U. Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium

    Bart De Decker

  2. School of Computing, University of Kent, CT2 7NZ, Canterbury, Kent, UK

    David W. Chadwick

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

Shariati, S., Koeune, F., Standaert, FX. (2012). Security Analysis of Image-Based PUFs for Anti-counterfeiting. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_3

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-32805-3_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32804-6

  • Online ISBN: 978-3-642-32805-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature