Cryptology ePrint Archive: Report 2015/583

Secure Key Generation from Biased PUFs

Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems

Abstract: PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error-correcting mechanism (e.g. based on the code-offset method) for dealing with bit errors between the enrollment and reconstruction of keys. When the used PUF does not have full entropy, entropy leakage between the helper data and the device-unique key material can occur. If the entropy level of the PUF becomes too low, the PUF-derived key can be attacked through the publicly available helper data. In this work we provide several solutions for preventing this entropy leakage for PUFs suffering from bias. The methods proposed in this work pose no limit on the amount of bias that can be tolerated, which solves an important open problem for PUF-based key generation. Additionally, the solutions are all evaluated based on reliability, efficiency, leakage and reusability showing that depending on requirements for the key generator different solutions are preferable.

Category / Keywords: implementation / PUFs, key generation

Original Publication (with major differences): IACR-CHES-2015

Date: received 12 Jun 2015

Contact author: roel maes at intrinsic-id com

Available format(s): PDF | BibTeX Citation

Note: A shorter version of this paper was accepted for publication at CHES-2015.

Version: 20150621:080549 (All versions of this report)

Short URL: ia.cr/2015/583

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]