Side-channel analysis of PUFs and fuzzy extractors

Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

105 Scopus citations

Abstract

Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated. For this purpose, we analysed the side-channel leakage of PUF architectures and fuzzy extractor implementations. We identified several attack vectors within common PUF constructions and introduce two side-channel attacks on fuzzy extractors. Our proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.

Original languageEnglish
Title of host publicationTrust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings
PublisherSpringer Verlag
Pages33-47
Number of pages15
ISBN (Print)9783642215988
DOIs
StatePublished - 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6740 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • FPGA
  • Fuzzy Extractor
  • Helper Data
  • Physical Unclonable Function (PUF)
  • Side-Channel Analysis (SCA)

Fingerprint

Dive into the research topics of 'Side-channel analysis of PUFs and fuzzy extractors'. Together they form a unique fingerprint.

Cite this