首页> 外文会议>IEEE International Symposium on Hardware Oriented Security and Trust >Fresh re-keying with strong PUFs: A new approach to side-channel security
【24h】

Fresh re-keying with strong PUFs: A new approach to side-channel security

机译:使用强大的PUF重新进行密钥更新:一种新的侧信道安全性方法

获取原文

摘要

Side-channel attacks on cryptographic implementations threaten system security via the loss of the secret key. Fresh re-keying techniques aim to mitigate these attacks by regularly updating the key so that the side-channel exposure for each key is minimized. Existing key update schemes generate fresh keys by processing a root key with arithmetic operations which have, unfortunately, been demonstrated to be also vulnerable to side-channel attacks. We propose a novel approach to fresh re-keying that replaces the arithmetic key update function with a strong Physically Unclonable Function (PUF). We show that the security of our scheme hinges on the resilience of the PUF to a power side-channel attack and propose a realization based on a Subthreshold Current Array (SCA) PUF. We show that SCA-PUF is resistant to simple power analysis and that it is resilient to a modeling attack that uses machine learning on the power side-channel. We target an insecure device and secure server encryption scenario for which we provide an efficient and scalable method of PUF enrollment. We finally propose an end-to-end encryption system with the PUF-based fresh re-keying scheme, using a reverse fuzzy extractor construction.
机译:对加密实现方式的侧通道攻击通过丢失密钥来威胁系统安全性。新鲜的密钥更新技术旨在通过定期更新密钥来减轻这些攻击,从而使每个密钥的侧信道暴露最小化。现有的密钥更新方案通过使用算术运算处理根密钥来生成新密钥,不幸的是,事实证明,这种算术运算也容易受到边信道攻击。我们提出了一种新颖的新密钥更新方法,该方法用强大的物理不可克隆功能(PUF)取代了算术密钥更新功能。我们证明了我们方案的安全性取决于PUF对功率侧信道攻击的恢复能力,并提出了基于亚阈值电流阵列(SCA)PUF的实现。我们证明SCA-PUF可以抵抗简单的功率分析,并且可以抵抗在功率侧信道上使用机器学习的建模攻击。我们针对不安全的设备和安全的服务器加密方案,为此我们提供了一种高效且可扩展的PUF注册方法。最后,我们提出了一种基于PUF的新鲜密钥更新方案的端到端加密系统,并使用了反向模糊提取器构造。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号