Cryptology ePrint Archive: Report 2019/300

Transient Effect Ring Oscillators Leak Too

Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer

Abstract: Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.

Category / Keywords: implementation / Transient effect ring oscillator, electromagnetic leaks, side-channel analysis, semi-invasive passive attack, physical unclonable function

Date: received 15 Mar 2019

Contact author: b colombier at univ-st-etienne fr

Available format(s): PDF | BibTeX Citation

Version: 20190320:102829 (All versions of this report)

Short URL: ia.cr/2019/300


[ Cryptology ePrint archive ]