Abstract
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In order to limit the attacker’s ability to read out secret information, the concept of Algorithmic Tamper Proof (ATP) security is needed as put forth by Gennaro, Lysyanskaya, Malkin, Micali and Rabin. An essential component to achieve ATP security is read-proof hardware. In this paper, we develop an implementation of read-proof hardware that is resistant against invasive attacks. The construction is based on a hardware and a cryptographic part. The hardware consists of a protective coating that contains a lot of randomness. By performing measurements on the coating a fingerprint is derived. The cryptographic part consists of a Fuzzy Extractor that turns this fingerprint into a secure key. Hence no key is present in the non-volatile memory of the device. It is only constructed at the time when needed, and deleted afterwards. A practical implementation of the hardware and the cryptographic part is given. Finally, experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic Tamper-Proof Security: Theoretical Foundations for Security against Hardware Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258–277. Springer, Heidelberg (2004)
Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Crypto Systems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Škorić, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of coating PUFs. Journal of Applied Physics(accepted for publication), http://eprint.iacr.org/2006/101
Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.: Generalized Privacy Amplification. IEEE Transactions on Information Theory 41(6), 1915–1923 (1995)
Bar-El, H.: Known Attacks Against Smartcards, Discretix Technologies Ltd., http://www.infosecwriters.com/text_resources/pdf/Known_Attacks_Against_Smartcards.pdf
Dodis, Y., Reyzin, M., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: 6th ACM Conference on Computer and Communication Security, pp. 28–36 (1999)
Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Pappu, R.: Physical One-way functions, Ph.D. thesis. MIT (2001)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-way functions. Science 297, 2026–2030 (2002)
Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science 4(7) (1998)
Kamendje, G.A., Posch, R.: Intrusion aware CMOS Random Pattern Generator for Cryptographic Applications. In: Rossler, P., Dorderlein, A. (eds.) Proceedings of Austrochip 2001, Vienna, Austria (October 12, 2001) ISBN 3-9501517-0-2
Smartec, Universal Transducer Interface evaluation board, Specifications v3.0, http://www.smartec.nl/pdf/Dsuti.pdf
Tuyls, P., Batina, L.: RFID tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)
Tuyls, P., Škorić, B.: Secret Key Generation from Classical Physics. In: Mukherjee, et al. (eds.) AmIware, Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, pp. 421–447. Kluwer, Dordrecht (2005)
Ignatenko, T., Schrijen, G.J., Škorić, B., Tuyls, P., Willems, F.: Estimating the Secrecy-Rate of Physical Uncloneable Functions with the Context-Tree Weighting Method, accepted at ISIT 2006 (2006)
Witteman, M.: Smart card security analysis. In: IPA Spring Days on Security, Kapellerput, Heeze, April 18-20 (2001), http://www.win.tue.nl/ipa/archive/springdays2001/witteman.ppt
Witteman, M.: Advances in Smartcard Security. In: Information Security Bulletin, July 2002, pp.11–22 (2002), http://www.riscure.com/articles/ISB0707MW.pdf
Yang, J., Gao, L., Zhang, Y.: Improving Memory Encryption Performance in Secure Processors. IEEE. Trans. Computers 53(5), 1–11 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tuyls, P., Schrijen, GJ., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R. (2006). Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_29
Download citation
DOI: https://doi.org/10.1007/11894063_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46559-1
Online ISBN: 978-3-540-46561-4
eBook Packages: Computer ScienceComputer Science (R0)