Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys

Vincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

This work deals with key generation based on Physically Obfuscated Keys (POKs), i.e., a certain type of tamperevident Physical Unclonable Function (PUF) that can be used as protection against invasive physical attacks. To design a protected device, one must take attacks such as probing of data lines or penetration of the physical security boundary into consideration. For the implementation of a POK as a countermeasure, physical properties of a material - which covers all parts to be protected - are measured. After measuring these properties, i.e. analog values, they have to be quantized in order to derive a cryptographic key. This paper will present and discuss the impact of the quantization method with regard to three parameters: key quality, tamper-sensitivity, and reliability. Our contribution is the analysis of two different quantization schemes considering these parameters. Foremost, we propose a new approach to achieve improved tampersensitivity in the worst-case with no information leakage. We then analyze a previous solution and compare it to our scenario. Based on empirical data we demonstrate the advantages of our approach. This significantly improves the level of protection of a tamper-resistant cryptographic device compared to cases not benefiting from our scheme.

Original languageEnglish
Title of host publicationProceedings of the 3rd Workshop on Cryptography and Security in Computing Systems, CS2 2016
PublisherAssociation for Computing Machinery
Pages13-18
Number of pages6
ISBN (Electronic)9781450340656
DOIs
StatePublished - 20 Jan 2016
Event3rd Workshop on Cryptography and Security in Computing Systems, CS2 2016 - Prague, Czech Republic
Duration: 20 Jan 2016 → …

Publication series

NameACM International Conference Proceeding Series
Volume20-January-2016

Conference

Conference3rd Workshop on Cryptography and Security in Computing Systems, CS2 2016
Country/TerritoryCzech Republic
CityPrague
Period20/01/16 → …

Keywords

  • Helper data
  • Information leakage
  • POK
  • PUF
  • Quantization
  • Security envelope
  • Tamper-resistance
  • Tamper-sensitivity

Fingerprint

Dive into the research topics of 'Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys'. Together they form a unique fingerprint.

Cite this