Paper 2024/446

Estimating the Unpredictability of Multi-Bit Strong PUF Classes

Ahmed Bendary, The Ohio State University
Wendson A. S. Barbosa, The Ohio State University
Andrew Pomerance, Potomac Research LLC
C. Emre Koksal, The Ohio State University
Abstract

With the ongoing advances in machine learning (ML), cybersecurity solutions and security primitives are becoming increasingly vulnerable to successful attacks. Strong physically unclonable functions (PUFs) are a potential solution for providing high resistance to such attacks. In this paper, we propose a generalized attack model that leverages multiple chips jointly to minimize the cloning error. Our analysis shows that the entropy rate over different chips is a relevant measure to the new attack model as well as the multi-bit strong PUF classes. We explain the sources of randomness that affect unpredictability and its possible measures using models of state-of-the-art strong PUFs. Moreover, we utilize min-max entropy estimators to measure the unpredictability of multi-bit strong PUF classes for the first time in the PUF community. Finally, we provide experimental results for a multi-bit strong PUF class, the hybrid Boolean network PUF, showing its high unpredictability and resistance to ML attacks.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
Multi-bit strong PUFsmodeling attackunpredictabilitycloning erroruniquenessentropy rate
Contact author(s)
bendary 1 @ osu edu
desabarbosa 1 @ osu edu
andrew @ potomacresear ch
koksal 2 @ osu edu
History
2024-03-15: approved
2024-03-15: received
See all versions
Short URL
https://ia.cr/2024/446
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/446,
      author = {Ahmed Bendary and Wendson A. S. Barbosa and Andrew Pomerance and C. Emre Koksal},
      title = {Estimating the Unpredictability of Multi-Bit Strong {PUF} Classes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/446},
      year = {2024},
      url = {https://eprint.iacr.org/2024/446}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.