Paper 2019/300

Transient Effect Ring Oscillators Leak Too

Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, and Viktor Fischer

Abstract

Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Transient effect ring oscillatorelectromagnetic leaksside-channel analysissemi-invasive passive attackphysical unclonable function
Contact author(s)
b colombier @ univ-st-etienne fr
History
2019-03-20: received
Short URL
https://ia.cr/2019/300
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/300,
      author = {Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer},
      title = {Transient Effect Ring Oscillators Leak Too},
      howpublished = {Cryptology ePrint Archive, Paper 2019/300},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/300}},
      url = {https://eprint.iacr.org/2019/300}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.