• DocumentCode
    2449306
  • Title

    Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

  • Author

    Majzoobi, Mehrdad ; Rostami, Mohamad ; Koushanfar, Farinaz ; Wallach, Dan ; Devadas, Srinivas

  • Author_Institution
    Electr. & Comput. Eng. Dept., Rice Univ., Houston, TX, USA
  • fYear
    2012
  • fDate
    24-25 May 2012
  • Firstpage
    33
  • Lastpage
    44
  • Abstract
    We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method´s resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.
  • Keywords
    cryptographic protocols; message authentication; PUF error tolerance; authentication application; energy constrained platform; fuzzy extractor; hash module; identification application; lightweight authentication; machine learning attack; random subsets; response pattern; robust authentication; secure authentication; slender PUF protocol; strong physical unclonable function; substring matching; ultra-low power embedded system; Authentication; Delay; Error correction; Hamming distance; Machine learning; Protocols; PUF; Pattern; Physical Unclonable Function; Substring; authentication; lightweight; matching; protocol; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy Workshops (SPW), 2012 IEEE Symposium on
  • Conference_Location
    San Francisco, CA
  • Print_ISBN
    978-1-4673-2157-0
  • Type

    conf

  • DOI
    10.1109/SPW.2012.30
  • Filename
    6227682