Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Lecture10 – More on Physically Unclonable Functions (PUFs)
Physical Unclonable Functions and Applications
Physical Unclonable Functions
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Outline  Introduction  Related Work  PUF-Based Tag Identification Algorithm  PUF-Based MAC Protocols  PUF Vs. Digital Hash Functions  Building PUFs.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Cryptography in The Presence of Continuous Side-Channel Attacks Ali Juma University of Toronto Yevgeniy Vahlis Columbia University.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Department of Computer Science University of Virginia New Directions in Reliability, Security and Privacy in Radio Frequency Identification Systems Leonid.
Bob can sign a message using a digital signature generation algorithm
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Chapter 10: Authentication Guide to Computer Network Security.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Cryptography on Non-Trusted Machines Stefan Dziembowski.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Cryptography Lecture 9 Stefan Dziembowski
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Distributed System Security Copyright © 2008.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Lecture 2: Introduction to Cryptography
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Prepared by Dr. Lamiaa Elshenawy
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
New Directions in Detection, Security and Privacy for RFID
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Network Security Celia Li Computer Science and Engineering York University.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
Leonid Bolotnyy Gabriel Robins
Cryptographic Hash Function
Cryptographic Hash Functions Part I
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Randomized PRF Tree Walking Algorithm for Secure RFID
Cryptographic Hash Functions Part I
Physical Unclonable Functions and Applications
One Time Signature.
Presentation transcript:

Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia

Contribution and Motivation Contribution Privacy-preserving tag identification algorithm Secure MAC algorithms Comparison of PUF with digital hash functions Motivation Digital crypto implementations require 1000’s of gates Low-cost alternatives –Pseudonyms / one-time pads –Low complexity / power hash function designs –Hardware-based solutions

PUF-Based Security Physical Unclonable Function (PUF) [Gassend et al 2002] PUF Security is based on –wire delays –gate delays –quantum mechanical fluctuations PUF characteristics –uniqueness –reliability –unpredictability PUF Assumptions –Infeasible to accurately model PUF –Pair-wise PUF output-collision probability is constant –Physical tampering will modify PUF

Privacy in RFID Privacy ABC Alice was here: A, B, C privacy

Private Identification Algorithm Assumptions –no denial of service attacks (e.g., passive adversaries, DoS detection/prevention mechanisms) –physical compromise of tags not possible It is important to have –a reliable PUF –no loops in PUF chains –no identical PUF outputs ID Request p(ID) ID Database ID 1, p(ID 1 ), p 2 (ID 1 ), …, p k (ID 1 )... ID n, p n (ID n ), p n 2 (ID n ), …, p n k (ID n )

Improving Reliability of Responses Run PUF multiple times for same ID & pick majority μ m (1-μ) N-m ) k R( μ, N, k ) ≥ (1 - ∑ N NmNm N+1 2 m= number of runs chain length unreliability probability overall reliability R(0.02, 5, 100) ≥ Create tuples of multi-PUF computed IDs & identify a tag based on at least one valid position value ∞ expected number of identifications S( μ, q ) = ∑ i [(1 – (1- μ ) i+1 ) q - (1 – (1-μ) i ) q ] i=1 tuple size S(0.02, 1) = 49, S(0.02, 2) = 73, S(0.02, 3) = 90 (ID 1, ID 2, ID 3 )

Privacy Model 1.A passive adversary observes polynomially-many rounds of reader-tag communications with multiple tags 2.An adversary selects 2 tags 3.The reader randomly and privately selects one of the 2 tags and runs one identification round with the selected tag 4.An adversary determines the tag that the reader selected Experiment: Definition: The algorithm is privacy-preserving if an adversary can not determine reader selected tag with probability substantially greater than ½ Theorem: Given random oracle assumption for PUFs, an adversary has no advantage in the above experiment.

PUF-Based MAC Algorithms MAC based on PUF –Motivation: “yoking-proofs”, signing sensor data –large keys (PUF is the key) –cannot support arbitrary messages MAC = (K, τ, υ) K K valid signature σ : υ (M, σ) = 1 forged signature σ’ : υ (M’, σ’) = 1, M = M’ Assumptions –adversary can adaptively learn poly-many (m, σ) pairs –signature verifiers are off-line –tag can store a counter (to protect against replay attacks)

Large Message Space σ (m) = c, r 1,..., r n, p c (r 1, m),..., p c (r n, m) Assumption: tag can generate good random numbers (can be PUF-based) Signature verification requires tag’s presence password-based or in radio-protected environment (Faraday Cage) learn p c (r i, m), 1 ≤ i ≤ n verify that the desired fraction of PUF computations is correct To protect against hardware tampering authenticate tag before MAC verification store verification password underneath PUF Key: PUF

Choosing # of PUF Computations α < prob v ≤ 1 and prob f ≤ β ≤ 1 0 ≤ t ≤ n-1 i=t+1 μ i (1-μ) n-i prob v (n, t, μ) = 1 - ∑ n nini j=t+1 τ j (1-τ) n-j prob f (n, t, τ) = 1 - ∑ n njnj prob v (n, 0.1n, 0.02) prob f (n, 0.1n, 0.4)

Theorem Given random oracle assumption for a PUF, the probability that an adversary could forge a signature for a message is bounded from above by the tag impersonation probability.

Small Message Space Assumption: small and known a priori message space Key[p, m i, c] = c, p c (1) (m i ),..., p c (n) (m i ) PUF message counter σ(m) = c, p c (1) (m),..., p c (n) (m),..., c+q-1, p c+q-1 (1) (m), p c+q-1 (n) (m) sub-signature Verify that the desired number of sub-signatures are valid PUF reliability is again crucial

Theorem Given random oracle assumption for a PUF, the probability that an adversary could forge a signature for a message is bounded by the tag impersonation probability times the number of sub-signatures.

Attacks on MAC Protocols originalclone Impersonation attacks –manufacture an identical tag –obtain (steal) existing PUFs Hardware-tampering attacks –physically probe wires to learn the PUF –physically read-off/alter keys/passwords Side-channel attacks –algorithm timing –power consumption Modeling attacks –build a PUF model to predict PUF’s outputs

Comparison of PUF With Digital Hash Functions Reference PUF: 545 gates for 64-bit input –6 to 8 gates for each input bit –33 gates to measure the delay Low gate count of PUF has a cost –probabilistic outputs –difficult to characterize analytically –non-unique computation –extra back-end storage Different attack target for adversaries –model building rather than key discovery Physical security –hard to break tag and remain undetected MD MD SHA Yuksel 1701 PUF 545 AES 3400 algorithm # of gates

PUF Design Attacks on PUF –impersonation –modeling –hardware tampering –side-channel Weaknesses of existing PUF New PUF design –no oscillating circuit –sub-threshold voltage Compare different non-linear delay approaches reliability

Conclusions and Future Work Develop theoretical framework for PUF Design new sub-threshold voltage based PUF Manufacture and test PUFs –varying environmental conditions –motion, acceleration, vibration, temperature, noise Design new PUF-based security protocols –ownership transfer –recovery from privacy compromise –PUFs on RFID readers } in progress PUF: hardware primitive for RFID security Identification and MAC algorithms based on PUF PUFs protect tags from physical attacks PUFs is the key

Thank You Questions ? Leonid Bolotnyy Dept. of Computer Science University of Virginia

PUF-Based Ownership Transfer Ownership Transfer To maintain privacy we need –ownership privacy –forward privacy Physical security is especially important Solutions –public key cryptography (expensive) –knowledge of owners sequence –trusted authority –short period of privacy

s 2,4 s 1,2 s 3,9 s 2,5 s 3,10 s 3,8 Using PUF to Detect and Restore Privacy of Compromised System 1.Detect potential tag compromise 2.Update secrets of affected tags s 1,0 s 2,0 s 1,1 s 2,1 s 3,1 s 2,2 s 2,3 s 3,0 s 3, 4 s 3,5 s 3,2 s 3,3 s 3,7 s 3,6

Related Work on PUF Optical PUF [Ravikanth 2001] Silicon PUF [Gassend et al 2002] –Design, implementation, simulation, manufacturing –Authentication algorithm –Controlled PUF PUF in RFID –Identification/authentication [Ranasinghe et al 2004] –Off-line reader authentication using public key cryptography [Tuyls et al 2006]