Paper 2016/939

Key Reconciliation Protocols for Error Correction of Silicon PUF Responses

Brice Colombier, Lilian Bossuet, David Hély, and Viktor Fischer

Abstract

Physical Unclonable Functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC). Indeed, by extracting an identifier from random process variations, they allow each instance of a design to be uniquely identified. However, the extracted identifiers are not stable enough to be used as is, and hence need to be corrected first. This is currently achieved using error-correcting codes in secure sketches, that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols. This interactive method, originating from quantum key distribution, allows two entities to correct errors in their respective correlated keys by discussing over a public channel. We believe that this can also be used by a device and a remote server to agree on two different responses to the same challenge from the same PUF obtained at different times. This approach has the advantage of requiring very few logic resources on the device side. The information leakage caused by the key reconciliation process is limited and easily computable. Results of implementation on FPGA targets are presented, showing that it is the most lightweight error-correction module to date.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. MINOR revision.IEEE Transactions on Information Forensics and Security
DOI
10.1109/TIFS.2017.2689726
Keywords
physical unclonable functionerror correctionkey reconciliation
Contact author(s)
b colombier @ univ-st-etienne fr
History
2017-08-24: revised
2016-09-29: received
See all versions
Short URL
https://ia.cr/2016/939
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/939,
      author = {Brice Colombier and Lilian Bossuet and David Hély and Viktor Fischer},
      title = {Key Reconciliation Protocols for Error Correction of Silicon PUF Responses},
      howpublished = {Cryptology ePrint Archive, Paper 2016/939},
      year = {2016},
      doi = {10.1109/TIFS.2017.2689726},
      note = {\url{https://eprint.iacr.org/2016/939}},
      url = {https://eprint.iacr.org/2016/939}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.