Abstract

This paper presents an efficient fuzzy extractor (FE) construction for secure cryptographic key generation from physically unclonable functions (PUFs). The proposed FE, named acceptance-or-rejection (AR)-based FE, utilizes a new debiasing scheme to extract a uniform distribution from a biased PUF response. The proposed debiasing scheme employs the principle of rejection sampling, and can extract a longer debiased bit string compared to those of conventional debiasing schemes. In addition, the proposed AR-based FE is extended to ternary PUF responses (i.e., ternary encoding of a PUF response). These responses can be derived according to cell-wise reliability of the PUF and are promising for extraction of stable and high-entropy responses from common PUFs. The performance of the AR-based Fes is evaluated through an experimental simulation of PUF-based key generation and compared with conventional FEs. We confirm that the proposed AR-based FE can achieve the highest efficiency in terms of PUF and nonvolatile memory (NVM) sizes for various PUF conditions among the conventional counterparts. More precisely, the AR-based FE can realize a 128-bit key generation with up-to 55% smaller PUF size or up-to 72% smaller NVM size than other conventional FEs. In addition, the ternary AR-based FE is up to 55% more efficient than the binary version, and can also achieve up-to 63% higher efficiency than conventional counterparts. Furthermore, we show that the AR-based FE can be applied to PUFs with local biases (e.g., biases depending on cell location in SRAM PUFs), unlike all the conventional schemes, for which only global (or identical) biases are assumed.

Highlights

  • Silicon physically unclonable functions (PUFs) are essential for construction of secure and trustable information systems

  • We describe the implementation of reproducible rejection sampling (RRS) and accepted cell extraction (ACE) operations, which requires no real-time processing in the reconstruction phase and induces little computational overhead compared to the conventional fuzzy extractor (FE)

  • This paper presented an efficient FE construction based on a new debiasing method named AR-based FE, which employs the principle of rejection sampling

Read more

Summary

Introduction

Silicon physically unclonable functions (PUFs) are essential for construction of secure and trustable information systems. PUFs exploit uncontrollable process variations (e.g., the electrical lengths of wires) to generate hardware-intrinsic random numbers. With these physically unclonable and tamper-evident features, PUFs are expected to provide a hardware root-of-trust for secure cryptographic key generation and entity authentication, among other applications [Mae03]. PUFs are classified into two types according to their input space size: weak and strong PUFs. A weak PUF typically accepts only one challenge or the number of challenges linear to the number of PUF cells. A strong PUF has a larger challenge space, the size of which increases exponentially with the number of cells. A typical application of weak PUFs is cryptographic secret key generation [BGS+08,MTV09,MHV12], whereas strong PUFs are primarily used for entity authentication involving a challengeand-response protocol [SD07]

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call