1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Trusted Design In FPGAs
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
International Symposium on Low Power Electronics and Design Low-Power Sub-Threshold Design of Secure Physical Unclonable Functions 1 Lang Lin, 2 Dan Holcomb,
Lecture10 – More on Physically Unclonable Functions (PUFs)
Physical Unclonable Functions and Applications
1 U NIVERSITY OF M ICHIGAN Reliable and Efficient PUF- Based Key Generation Using Pattern Matching Srini Devadas and Zdenek Paral (MIT), HOST 2011 Thomas.
Physical Unclonable Functions
1 Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev,
Slender PUF Protocol Authentication by Substring Matching M. Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, and S. Devadas* International Workshop on.
Daniel E. Holcomb, Wayne P. Burleson and Kevin Fu
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Fuzzy extractor based on universal hashes
Strong Error Detection for Control Units Against Advanced Attackers Kahraman Daglar Akdemir Advisor: Berk Sunar Electrical and Computer Engineering MOTIVATION.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
16/13/2015 3:30 AM6/13/2015 3:30 AM6/13/2015 3:30 AMIntroduction to Software Development What is a computer? A computer system contains: Central Processing.
Chapter 1. Introduction This course is all about how computers work But what do we mean by a computer? –Different types: desktop, servers, embedded devices.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Institute of Digital and Computer Systems 1 Fabio Garzia / Finding Peak Performance in a Process23/06/2015 Chapter 5 Finding Peak Performance in a Process.
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts Michael Epstein 1, Laszlo Hars 2, Raymond Krasinski 1, Martin.
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
Authentication in Ubiquitous Computing Laurent BUSSARD and Yves ROUDIER Institut Eurecom Workshop on Security in Ubiquitous Computing UBICOMP 2002, Goteborg.
CS294-6 Reconfigurable Computing Day 3 September 1, 1998 Requirements for Computing Devices.
DIGITAL ELECTRONICS CIRCUIT P.K.NAYAK P.K.NAYAK ASST. PROFESSOR SYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
EKT 221 Digital Electronics II
DIGITAL COMPONENTS By Sohaib.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Trusted Computing Platform Alliance
Bit Error Probability Evaluation of RO PUFs Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing Institute of Information Engineering, CAS, Beijing, China.
Intro to Architecture – Page 1 of 22CSCI 4717 – Computer Architecture CSCI 4717/5717 Computer Architecture Topic: Introduction Reading: Chapter 1.
EKT 221 : Digital 2 Memory Basics
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Project Presentation: Physical Unclonable Functions
Smart Card Technology & Features
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
By Brian Sutherland and Chou Peter Hoang
Rinoy Pazhekattu. Introduction  Most IPs today are designed using component-based design  Each component is its own IP that can be switched out for.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Cryptography Against Physical Attacks Dana Dachman-Soled University of Maryland
Cryptographic Hash Functions
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Design of Physically Unclonable Functions Using FPGAs
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
e-Wallet – THE FUTURE OF CARDS
Submitted by Abi Mathew Roll No:1
Overview on Hardware Security
Authentication Schemes for Session Passwords using Color and Images
COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE
ICS 454 Principles of Cryptography
Protect Your Hardware from Hacking and Theft
ICS 454 Principles of Cryptography
Chapter 1 Introduction.
Physical Unclonable Functions and Applications
ECE 352 Digital System Fundamentals
Hash Function Requirements
presented by Fabian Schläfli
Presentation transcript:

1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others

2 UCR Hardware security primitives Our next topic looks at hardware primitives that can assist with security Examples  True random number generators (Intel’s RdRand)  AES/SHA instructions (hardware crypto support)  PUFs (today)  ORAM (today?)  The wire-tap problem for generating keys  Higher level mechanisms (starting next class) What does hardware offer; lets consider some of the above.

3 UCR PUF Introduction  Physical Unclonable Function (PUF)  Rely on process variations  Variation is inherent in fabrication process  Unique for each physical instance—”hardware fingerprint”  Cannot model, cannot clone (or can you?)  Relative variation increases as the fab process advances-- good  Non-silicon PUFs can help with tamper resistance

4 UCR Definition A Physical Random Function or Physical Unclonable Function (PUF) is a function that is:  Based on a physical system  Easy to evaluate (using the physical system)  Its output looks like a random function  Unpredictable even for an attacker with physical access  Reliable: returns the same (or similar) value for the same input challenge

5 UCR Advantages and Applications of PUFs Advantages:  No secure memory required  Not vulnerable to physical attacks  Can be very small – embedded devices  Intrinsic defense against intrusive hardware Some applications  Device identification and authentication  Secure key generation  software licensing to a specific machine  Building block for crypto algorithms (RNG, Key generation, …)

6 UCR Scenario: Storing digital information in a device in a way that is resistant to physical attack is difficult and expensive. IBM 4758 Tamper-proof package containing a secure processor which has a secret key and memory Tens of sensors, resistance, temperature, voltage, etc. Continually battery-powered ~ $3000 for a 99 MHz processor and 128MB of memory

7 UCR Silicon PUF – Proof of Concept Because of process variations, no two Integrated Circuits are identical Identical circuits with identical layouts on different FPGAs: path delays vary enough across ICs to use them for identification. Combinatorial Circuit Challenge Response

8 UCR PUF Circuits ● Arbiter PUF

9 UCR 100 bits of response Distance between Chip X and Y responses = 24 bits Experiments Fabricated candidate PUF on multiple IC ’ s, 0.18  TSMC Apply 100 random challenges and observe response At 70C measurement noise for chip X = 2 Can identify individual ICs Measurement noise for Chip X = 0.5

10 UCR PUF Circuits  construct a k-bit response  one circuit can be used k times with different inputs  duplicate the single-output PUF circuit

11 UCR PUF Circuits ● Ring Oscillator PUF

12 UCR Ring Oscillator Circuits  Easier Implementation  No need for careful layout and routing  Slower, Larger, more power to generate bits  Better for FPGAs and secure processors  Hard to generate many challenge response pairs

13 UCR PUF Circuits ● Ring Oscillator PUF  environmental conditions  Choose ring oscillator pairs, whose frequencies are far apart=>remove key generation error

14 UCR PUF Circuits ● Lightweight Secure PUF. Avalance property Hardware Security and Trust, CE, SUT

15 UCR PUF Circuits SRAM ● SRAM PUF

16 UCR PUF Circuits ● Butterfly PUF

17 UCR Applications of PUF 1) Low cost authentication

18 UCR Applications of PUF 2) Cryptographic Key Generator *ECC=Error Correction Code

19 UCR Applications of PUF 3) Software Licensing and Anonymous Computation *CPUF=Controlled PUF

20 UCR Applications of PUF 3) Software Licensing and Anonymous Computation

21 UCR 0.1% of all challenges do not return a consistent response These meta-stable challenges generate responses which can vary unpredictably Applications of PUF 4) Entropy source for RNG

22 UCR However… Security of PUFs is unclear – our required reading Many PUFs (especially timing based) shown to be in fact clonable (CCS 2010 paper)  General idea: machine learning based on some challenges allows us to predict other challenges (>99% success)  Sometimes the effort is big (10s of days) Gap between PUF implementations and models in literature  Security parameters cannot be determined in practice