Filters








7 Hits in 5.0 sec

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [chapter]

Georg T. Becker
2015 Lecture Notes in Computer Science  
Since XOR Arbiter PUFs are one of the most popular and promising electrical strong PUF designs, our reliability-based machine learning attack raises doubts that secure and lightweight electrical strong  ...  This is in stark contrast to the state-of-the-art machine learning attacks on XOR PUFs that are shown to have an exponential increase in challenge and responses.  ...  We present the first cloning attack on a commercial strong PUF-based RFID tag, demonstrating the gap between the promised and achieved security with strong PUFs in practice.  ... 
doi:10.1007/978-3-662-48324-4_27 fatcat:55nibzb7bbh6ljxp5yjnnrskoi

Design and Evaluate Recomposited OR-AND-XOR-PUF [article]

Jianrong Yao, Lihui Pang, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao
2022 arXiv   pre-print
Based on the space of challenge-response pairs (CRPs), it has two categories:weak PUF and strong PUF.  ...  This work is to first evaluate the main PUF performance, in particular,uniformity and reliability of the OR-AND-XOR-PUF(OAX-PUF)-(x, y, z)-OAX-PUF.  ...  We acknowledge support from the National Natural Science Foundation of China (62002167 and 61901209) and National Natural Science Foundation of JiangSu (BK20200461).  ... 
arXiv:2110.00909v3 fatcat:swltxedvozb6pm2qduj53ivtsi

Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
2015 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Security-critical products rely on the secrecy and integrity of their cryptographic keys.  ...  We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation.  ...  Bias means that 0 and 1 do not occur with equal probability. One often distinguishes between two categories of PUFs, depending on their scalability.  ... 
doi:10.1109/tcad.2014.2370531 fatcat:jdfurc2vkngfnfbgd67jgtfg4m

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones  ...  This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  More concretely, such measures should be in place to narrow the gap between the characteristics of a cryptographic primitive implemented in reality and what is assumed about that cf. [Maes 2013 ].  ... 
arXiv:2005.04344v2 fatcat:jstlhwebznfadf5g2zdri4sb6i

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2020
Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones  ...  This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  Acknowledgments The author would like to acknowledge the support of AFOSR under award number FA 9550-14-1-0351.  ... 
doi:10.48550/arxiv.2005.04344 fatcat:omcbbz2crfdcjfol43kepmpdjm

Aalborg Universitet Lightweight Cryptography for Passive RFID Tags Lightweight Cryptography for Passive RFID Tags

David, Mathieu David, Moderator Assoc, Kiel Jensen, Mathieu David, Niels Vej, Aalborg Denmark
2011 unpublished
In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint among the smallest in the published literature and aims at being implemented on printed electronics RFID tags.  ...  This metric also has the advantage of being customizable, depending on the requirement of an integrator for a particular application.  ...  There are also various IPUF, most often referred to simply as PUF (Physical Unclonable Function), such as: • architectures termed Arbiter PUFs [161] , • XOR Arbiter PUFs [161] , • Lightweight Secure  ... 
fatcat:lrxrgztwvvc7fkwl5efhykdl5a

Dagstuhl Reports, Volume 9, Issue 7, July 2019, Complete Issue [article]

2020
For example, while the arbiter PUF is susceptible to model building, the XOR-composition of arbiter PUF was thought to prevent model-building of the components.  ...  An example of that phenomenon can be seen in the composition of individual PUF using an XOR operation into a so-called XOR-PUF.  ...  DNA, PUFs, etc.)  ... 
doi:10.4230/dagrep.9.7 fatcat:x4rfs6mnwfdztnbt6lghoavg6e