Paper 2019/300
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, and Viktor Fischer
Abstract
Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- Transient effect ring oscillatorelectromagnetic leaksside-channel analysissemi-invasive passive attackphysical unclonable function
- Contact author(s)
- b colombier @ univ-st-etienne fr
- History
- 2019-03-20: received
- Short URL
- https://ia.cr/2019/300
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/300, author = {Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer}, title = {Transient Effect Ring Oscillators Leak Too}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/300}, year = {2019}, url = {https://eprint.iacr.org/2019/300} }