We propose the first concrete protocol design for initialization in SHIELD and an improved protocol design for authentication in SHIELD (compared to DARPA's call for proposals for SHIELD). As the basis for authentication we propose to use AES counter mode encryption (as opposed to DARPA's plain AES encryption). We show that this leads to several advantages: (1) resistance to a ``try-and-check'' attack which in case of DARPA's authentication protocol nullifies the effectiveness of one of SHIELD's main goals (that of being able to detect and trace adversarial activities with significant probability), (2) immunity against differential power analysis and differential fault analysis for free, (3) a 2$\times$ speed up of the authentication phase by halving the number of communication rounds with the server, and (4) a significant reduction of the power consumption of the dielet by halving the number of needed AES encryptions and by halving the number of transmitted bits.
For initialization (each dielet needs to go through an initialization phase during which the manufacturer sets a serial ID and cryptographic key) we propose the first efficient and secure protocol where dielets generate their own serial ID and key by using a true random number generator (TRNG). The advantage of the proposed initialization protocol is that (1) dielets are able to efficiently generate their serial IDs and keys in parallel on the wafer during a trusted manufacturing process, (2) dielets communicate their key and serial ID to a trusted authentication server after insertion into host chips during a trusted assembly process (this avoids uploading keys and serial IDs to authentication servers becoming a bottleneck), and (3) transits between trusted fabrication and trusted assembly facilities do not need to be trusted (due to a one-time initialization mode construct).
The area overhead of our authentication and initialization protocols together is only 64-bit NVM, one 8-bit counter and a TRNG based on a single SRAM-cell together with corresponding control logic.
Category / Keywords: Supply Chain Security, SHIELD, Initialization Protocol, Authentication Protocol, Counter Mode Encryption Date: received 5 Mar 2015, last revised 28 Jun 2015 Contact author: chenglu jin at uconn edu Available format(s): PDF | BibTeX Citation Note: Added more discussion and implementation details. Version: 20150629:051547 (All versions of this report) Short URL: ia.cr/2015/210 Discussion forum: Show discussion | Start new discussion