ebook img

Physically Unclonable Functions. From basic Design Principles to advanced Hardware Security Applications PDF

254 Pages·2018·7.537 MB·english
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Physically Unclonable Functions. From basic Design Principles to advanced Hardware Security Applications

Basel Halak Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications 123 BaselHalak Southampton UK ISBN978-3-319-76803-8 ISBN978-3-319-76804-5 (eBook) https://doi.org/10.1007/978-3-319-76804-5 LibraryofCongressControlNumber:2018933502 ©SpringerInternationalPublishingAG,partofSpringerNature2018 Preface Computing devices are increasingly forming an integral part of our daily life; this trend is driven by the proliferation of the Internet of things (IoT) technology. By 2025, it is anticipated that the IoT paradigm will encompass approximately 25 billionconnecteddevices.Theinterconnectionofsuchsystemsprovidestheability to collect huge amounts of data which are then processed and analysed for further useful actions. Applications of this technology include personal health monitoring devices, the smart home appliances, smartphones, environmental monitoring sys- tems and critical infrastructure (e.g. power grids, transportation system and water pipes). The pervasive nature of this technology means we will soon be finding com- putingdeviceseverywherearoundus,inourfactories,homes,carsandeveninour bodies in the form of medical implants. A significant proportion of these devices will be storing sensitive data. Therefore, it is very important to ensure that such devices are safe and trustworthy, however; this is not an easy task, and there still many challenges ahead. First, there is a rising risk of hardware Trojans insertion because of the inter- national and distributed nature of the integrated circuits production business. Second,securityattacks,especiallythose thatrequirephysicalaccesstothedevice under attack, are becoming more feasible given the pervasive nature of IoT tech- nology. Third, most of IoT devices are considered to be resource-constrained systems,whichmakesitprohibitivelyexpensivetoimplementclassiccryptographic algorithms;inthosecases,acheaperandmoreenergy-efficientsolutionisrequired. Physically unclonable functions (PUFs) are a class of novel hardware security primitives that promise a paradigm shift in many security applications; their rela- tivelysimplearchitecturescananswermanyoftheabovesecuritychallenges.These functions are constructed to exploit the intrinsic variations in the integrated circuit fabrication process in order to give each silicon chip a unique identifier, in other words, a hardware-based fingerprint. The versatile security applications of the PUF technology mean that an increasingnumberofpeoplemustunderstandhowitworksandhowitcanbeused in practice. This book addresses this issue by providing a comprehensive introduction on the design, evaluation metrics and security applications of physi- callyunclonablefunctions.Itiswrittentobeeasilyaccessiblebybothstudentsand engineering practitioners. Chapter 1 of this book gives a summary of the existing security attacks and explainstheprinciplesofthecryptographicprimitivesusedasthebuildingblocksof securitydefencemechanisms;itthenintroducesthephysicallyunclonablefunction (PUF) technology and outlines its applications. Chapter 2 explains the origin of physical disorder in integrated circuits and explains how this phenomenon can be used to construct different architectures of silicon-based PUFs; it also outlines the metricsusedtoevaluateaPUFdesignandgivesthereaderaninsightintothedesign andimplementationofPUFonconfigurablehardwareplatforms.Chapter3explains the physical origins of the major reliability issues affecting CMOS technology and discusses how these issues can affect the usability of PUF technology; it also pre- sents a case study on the evaluation of the impact of CMOS ageing on the quality metricsofPUFdesigns.Chapter4providesacomprehensivetutorialonthedesign and implementation principles of error corrections schemes typically used for reli- able PUF designs; it also explains in details the state-of-the-art pre-reliability enhancement processing approaches applied at the chip post-fabrication stage. Chapter5investigatesthesecurityofPUFascryptographicprimitives;itdiscusses the existing attacks on PUFs and possible countermeasures and, in addition, intro- ducesanumberofqualitymetricstoevaluatethesecurityofPUFdesigns.Chapter6 focusesprimarilyonhowtousePUFtechnologyinpractice;itexplainsindetailhow PUF technology can be used to securely generate and store cryptographic keys, construct hardware-assisted security protocols, design low-cost secure sensor, develop anti-counterfeit solutionsand implementanti-tempter integrated circuits. Thisbookhasmanyfeaturesthatmakeitauniquesourceforstudents,engineers and educators. The topics are introduced in accessible manner and supported with many examples. The mathematics are explained in detail to make them easy to understand. Detailed circuit diagrams are provided for many of the PUF architec- tures to allow reproducibility of the materials. Each chapter includes a list of worked exercises, which can be an excellent resource for classroom teaching. In addition, a list of problems is provided at the end of each part; in total, this book contains more than 80 problems and worked examples. The appendices include exemplar digital design of PUF written in system Verilog and a list of MATLAB scriptsusedinthisbooktocharacterisePUFqualitymetrics.Thedetailedexamples ofPUFapplicationsinChap.6canbeanexcellentsourceforcourseprojects.Each chapter ends with a conclusion, which summarises the important lessons and out- lines the outstanding research problems in the related areas. The book has a large number of references which give plenty of materials for further reading. How to Use this Book Thematerial ofthisbookhasevolvedovermanyyearsofworkingonthistopicin research and teaching. From our experience, one can teach most of the book contents in a one semester course, which includes 36 one-hour sessions. Some of the book chapters can be also taught separately as short courses or part of other modules. Here are a couple of examples Short Course Example 1: Title: The Principles of PUF Technology Contents: Chapters: 1 & 2 and Appendices 1 & 2 Short Course Example 2: Title: PUF-Assisted Security Protocols Contents: Chapter 2, Sections 6.4 and 6.5 and Appendices 1 & 2 Graduate students and engineer, it is advisable that you read the book chronolog- ically to achieve the best learning experience. Asanengineer,aresearcherandaneducator,Ihaveworkedinthefieldofhardware security for more than 10 years and was always fascinated by its many challenges and intriguing problems. I hope you enjoy reading this book as much as I enjoyed writing it. Southampton, UK Basel Halak January 2018 Contents 1 A Primer on Cryptographic Primitives and Security Attacks .. .... 1 1.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 1 1.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 3 1.3 An Overview of Security Attacks.... .... .... .... ..... .... 3 1.3.1 Communication Attacks .... .... .... .... ..... .... 4 1.3.2 Software Attacks.. .... .... .... .... .... ..... .... 4 1.3.3 Hardware Attacks . .... .... .... .... .... ..... .... 5 1.4 Cryptographic Primitives .. .... .... .... .... .... ..... .... 7 1.4.1 Symmetric Ciphers .... .... .... .... .... ..... .... 7 1.4.2 Asymmetric Ciphers ... .... .... .... .... ..... .... 8 1.4.3 One-Way Hash Functions ... .... .... .... ..... .... 8 1.4.4 Random Number Generators. .... .... .... ..... .... 9 1.4.5 Oblivious Transfer. .... .... .... .... .... ..... .... 9 1.4.6 Bit Commitment .. .... .... .... .... .... ..... .... 9 1.5 Why We Need Hardware Security? .. .... .... .... ..... .... 9 1.6 Physically Unclonable Functions .... .... .... .... ..... .... 11 1.7 Conclusions ... .... ..... .... .... .... .... .... ..... .... 13 1.8 Problems.. .... .... ..... .... .... .... .... .... ..... .... 13 References.. .... .... .... ..... .... .... .... .... .... ..... .... 14 2 Physically Unclonable Functions: Design Principles and Evaluation Metrics... ..... .... .... .... .... .... ..... .... 17 2.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 17 2.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 18 2.3 What Is Physical Disorder?. .... .... .... .... .... ..... .... 18 2.4 The Origins Physical Disorder in Integrated Circuits . ..... .... 20 2.4.1 Devices’ Geometry .... .... .... .... .... ..... .... 21 2.4.2 Devices’ Material . .... .... .... .... .... ..... .... 21 2.4.3 Interconnects’ Geometry .... .... .... .... ..... .... 22 2.4.4 Interconnects Material.. .... .... .... .... ..... .... 22 2.5 How to Design a Physically Unclonable Function ... ..... .... 24 2.6 Delay-Based PUFs .. ..... .... .... .... .... .... ..... .... 26 2.6.1 Arbiter PUFs..... .... .... .... .... .... ..... .... 26 2.6.2 Ring Oscillator PUF ... .... .... .... .... ..... .... 29 2.6.3 Self-timed Rings PUF.. .... .... .... .... ..... .... 30 2.7 Current-Based PUFs. ..... .... .... .... .... .... ..... .... 31 2.7.1 Current-Based PUFs Using Transistors Arrays .... .... 31 2.7.2 Current-Based PUFs Using Dynamic Random Access Memories .. ..... .... .... .... .... .... ..... .... 34 2.8 Voltage-Based PUFs. ..... .... .... .... .... .... ..... .... 35 2.8.1 SRAM PUFs..... .... .... .... .... .... ..... .... 35 2.8.2 Latch-Based PUFs. .... .... .... .... .... ..... .... 37 2.9 Evaluation Metrics of PUF Devices .. .... .... .... ..... .... 38 2.9.1 Uniqueness . ..... .... .... .... .... .... ..... .... 38 2.9.2 Reliability .. ..... .... .... .... .... .... ..... .... 39 2.9.3 Uniformity.. ..... .... .... .... .... .... ..... .... 40 2.9.4 Tamper Resistance. .... .... .... .... .... ..... .... 40 2.10 Case Study: FPGA Implementation of a Configurable Ring-Oscillator PUF. ..... .... .... .... .... .... ..... .... 40 2.10.1 Design Rationale.. .... .... .... .... .... ..... .... 41 2.10.2 Design Architecture.... .... .... .... .... ..... .... 41 2.10.3 Hardware Implementation and Evaluation... ..... .... 44 2.11 Comparison of Existing PUFs Design .... .... .... ..... .... 46 2.12 Conclusions ... .... ..... .... .... .... .... .... ..... .... 47 2.13 Problems.. .... .... ..... .... .... .... .... .... ..... .... 48 References.. .... .... .... ..... .... .... .... .... .... ..... .... 50 3 Reliability Challenges of Silicon-Based Physically Unclonable Functions.. .... .... .... ..... .... .... .... .... .... ..... .... 53 3.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 53 3.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 54 3.3 Aging Issues in CMOS Circuits. .... .... .... .... ..... .... 54 3.3.1 Bias Temperature Instability (BTI) .... .... ..... .... 54 3.3.2 Hot Carrier Injection (HCI).. .... .... .... ..... .... 56 3.3.3 Time-Dependent Dielectric Breakdown (TDDB)... .... 57 3.3.4 Electromigration .. .... .... .... .... .... ..... .... 57 3.3.5 On the Susceptibility of PUFs to Aging Mechanisms ... 58 3.4 Sources of Soft Errors in CMOS Integrated Circuits . ..... .... 58 3.4.1 Radiation-Induced Soft Errors.... .... .... ..... .... 59 3.4.2 Crosstalk Noise... .... .... .... .... .... ..... .... 60 3.4.3 Ground Bounce... .... .... .... .... .... ..... .... 60 3.4.4 Thermal Noise.... .... .... .... .... .... ..... .... 61 3.4.5 On the Susceptibility of PUFs to Soft Errors. ..... .... 61 3.5 Case Study: Evaluating the Impact of Aging on Silicon-Based Physically Unclonable Functions .... .... .... .... ..... .... 62 3.5.1 Evaluation Methodology.... .... .... .... ..... .... 62 3.5.2 Experimental Setup.... .... .... .... .... ..... .... 63 3.5.3 Results and Discussion . .... .... .... .... ..... .... 64 3.6 Conclusions and Learned Lessons ... .... .... .... ..... .... 66 3.7 Problems.. .... .... ..... .... .... .... .... .... ..... .... 66 References.. .... .... .... ..... .... .... .... .... .... ..... .... 69 4 Reliability Enhancement Techniques for Physically Unclonable Functions.. .... .... .... ..... .... .... .... .... .... ..... .... 73 4.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 73 4.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 74 4.3 The Computation of the Bit Error Rate of PUFs .... ..... .... 74 4.4 The Design Principles of Error Correction Codes.... ..... .... 76 4.4.1 Preliminaries ..... .... .... .... .... .... ..... .... 76 4.4.2 Groups. .... ..... .... .... .... .... .... ..... .... 78 4.4.3 Rings and Fields.. .... .... .... .... .... ..... .... 79 4.4.4 Fundamentals of Linear Codes ... .... .... ..... .... 80 4.4.5 How to Design Linear Codes .... .... .... ..... .... 81 4.4.6 Hamming Codes .. .... .... .... .... .... ..... .... 85 4.4.7 Cyclic Codes..... .... .... .... .... .... ..... .... 87 4.4.8 Golay Code. ..... .... .... .... .... .... ..... .... 98 4.4.9 BCH Codes. ..... .... .... .... .... .... ..... .... 99 4.4.10 Block Error Probability. .... .... .... .... ..... .... 112 4.5 Reliable PUF Design Flow. .... .... .... .... .... ..... .... 113 4.6 Reliability Enhancement Using Pre-processing Techniques . .... 113 4.6.1 BTI Aging Acceleration .... .... .... .... ..... .... 114 4.6.2 HCI Aging Acceleration .... .... .... .... ..... .... 116 4.7 Reliability Enhancement Using Stable Bits Selection. ..... .... 116 4.7.1 Index Based Masking .. .... .... .... .... ..... .... 116 4.7.2 Stable-PUF-Marking ... .... .... .... .... ..... .... 118 4.8 Reliable PUF Response Generation Methods ... .... ..... .... 119 4.8.1 Secure Sketch Using Code-Offset Construction (Information Redundancy)... .... .... .... ..... .... 119 4.8.2 Secure Sketch Using Syndrome Coding Construction ..... .... .... .... .... .... ..... .... 121 4.8.3 Temporal Majority Voting... .... .... .... ..... .... 122 4.8.4 Hardware Redundancy.. .... .... .... .... ..... .... 123 4.9 Cost Analysis of Reliability Enhancement Approaches..... .... 123 4.10 Conclusions ... .... ..... .... .... .... .... .... ..... .... 125 4.11 Problems.. .... .... ..... .... .... .... .... .... ..... .... 126 References.. .... .... .... ..... .... .... .... .... .... ..... .... 128 5 Security Attacks on Physically Unclonable Functions and Possible Countermeasures.... .... ..... .... .... .... .... .... ..... .... 131 5.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 131 5.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 132 5.3 What Is a Secure PUF? ... .... .... .... .... .... ..... .... 133 5.4 Security Evaluation Metrics for PUF . .... .... .... ..... .... 134 5.4.1 Notation ... ..... .... .... .... .... .... ..... .... 134 5.4.2 Randomness ..... .... .... .... .... .... ..... .... 134 5.4.3 Physical Unclonability.. .... .... .... .... ..... .... 136 5.4.4 Unpredictability (Mathematical Unclonability) .... .... 136 5.4.5 Uniqueness . ..... .... .... .... .... .... ..... .... 139 5.4.6 An Exemplar PUF Security Evaluation. .... ..... .... 139 5.5 Types of Adversaries ..... .... .... .... .... .... ..... .... 142 5.5.1 Eavesdropping (Snooping) Adversary.. .... ..... .... 143 5.5.2 Black Box Adversaries . .... .... .... .... ..... .... 143 5.5.3 White Box Adversaries. .... .... .... .... ..... .... 143 5.6 Mathematical Cloning Attacks .. .... .... .... .... ..... .... 144 5.7 Mathematical Cloning Using Support Vector Machine..... .... 144 5.7.1 Mathematical Definition .... .... .... .... ..... .... 144 5.7.2 Basic Working Principles ... .... .... .... ..... .... 146 5.7.3 Kernels .... ..... .... .... .... .... .... ..... .... 148 5.7.4 How to Set the SVM Algorithm Parameters . ..... .... 150 5.7.5 Cross-Validation .. .... .... .... .... .... ..... .... 150 5.7.6 Case Study: Modelling Arbiter PUF Using Support Vector Machine... .... .... .... .... .... ..... .... 151 5.8 Mathematical Cloning Using Artificial Neural Networks (ANN) ... ..... .... .... .... .... .... ..... .... 154 5.8.1 Mathematical Definition .... .... .... .... ..... .... 154 5.8.2 Case Study: Modelling TCO PUF Using Neural Networks... ..... .... .... .... .... .... ..... .... 155 5.9 Countermeasures of Mathematical Cloning Attacks .. ..... .... 155 5.9.1 Minimum Readout Time (MTR) Approach.. ..... .... 157 5.9.2 Partial Masking of Challenges/Response Bits ..... .... 157 5.9.3 Partial Utilisation of Challenges/Response Pairs ... .... 158 5.9.4 Controlled PUFs .. .... .... .... .... .... ..... .... 158 5.9.5 Permutation-Based Obfuscation... .... .... ..... .... 159 5.9.6 Substitution-Based Obfuscation... .... .... ..... .... 162 5.9.7 Other Obfuscation Methods.. .... .... .... ..... .... 163 5.9.8 Case Study: Evaluation of Mathematical Cloning Countermeasures.. .... .... .... .... .... ..... .... 163 5.10 Side Channel Attacks..... .... .... .... .... .... ..... .... 165 5.10.1 Fault Injection Attacks . .... .... .... .... ..... .... 166 5.10.2 Power Analysis Attacks. .... .... .... .... ..... .... 167 5.10.3 Helper Data Leakage... .... .... .... .... ..... .... 169 5.11 Countermeasures of Side Channel Attack.. .... .... ..... .... 171 5.12 Physical Cloning Attacks .. .... .... .... .... .... ..... .... 171 5.12.1 Physical Characterisation Techniques of PUF..... .... 172 5.12.2 Physical Emulation Methods of PUFs.. .... ..... .... 173 5.13 Countermeasures of Physical Cloning Attacks .. .... ..... .... 174 5.14 Comparative Analysis of Attacks and Countermeasures.... .... 174 5.15 Conclusions and Learned Lessons ... .... .... .... ..... .... 176 5.16 Problems.. .... .... ..... .... .... .... .... .... ..... .... 177 References.. .... .... .... ..... .... .... .... .... .... ..... .... 179 6 Hardware-Based Security Applications of Physically Unclonable Functions.. .... .... .... ..... .... .... .... .... .... ..... .... 183 6.1 Introduction ... .... ..... .... .... .... .... .... ..... .... 183 6.2 Chapter Overview... ..... .... .... .... .... .... ..... .... 183 6.3 Cryptographic Key Generation.. .... .... .... .... ..... .... 184 6.3.1 Motivation.. ..... .... .... .... .... .... ..... .... 184 6.3.2 PUF Design Requirements .. .... .... .... ..... .... 185 6.3.3 PUF-Based Key Generation Process ... .... ..... .... 185 6.3.4 Design Case Study: PUF-Based Key Generation... .... 187 6.4 Entity Authentication ..... .... .... .... .... .... ..... .... 190 6.4.1 Motivation.. ..... .... .... .... .... .... ..... .... 190 6.4.2 PUF Design Requirements .. .... .... .... ..... .... 192 6.4.3 Basic PUF Unilateral Authentication Scheme ..... .... 193 6.4.4 The Principles of Fuzzy Authentication. .... ..... .... 194 6.4.5 Advance PUF Authentication Schemes. .... ..... .... 198 6.5 Hardware-Assisted Cryptographic Protocols.... .... ..... .... 201 6.5.1 Motivation.. ..... .... .... .... .... .... ..... .... 201 6.5.2 PUF-Based Key Exchange (KE) Schemes... ..... .... 202 6.5.3 Oblivious Transfer (OT) .... .... .... .... ..... .... 202 6.5.4 Bit-Commitment (BC) Schemes .. .... .... ..... .... 207 6.6 Remote Secure Sensors.... .... .... .... .... .... ..... .... 208 6.6.1 Motivation.. ..... .... .... .... .... .... ..... .... 208 6.6.2 Principles of PUF-Based Secure Sensors.... ..... .... 209 6.6.3 PUF Design Requirements .. .... .... .... ..... .... 211 6.6.4 Design Case Study: Arbiter PUF Sensors ... ..... .... 213 6.7 Anti-counterfeiting Techniques.. .... .... .... .... ..... .... 216

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.