Download PDF

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

Publication date: 2015-01-01
Volume: 34 Pages: 889 - 902
Publisher: Institute of Electrical and Electronics Engineers

Author:

Delvaux, Jeroen
Gu, Dawu ; Schellekens, Dries ; Verbauwhede, Ingrid

Keywords:

Science & Technology, Technology, Computer Science, Hardware & Architecture, Computer Science, Interdisciplinary Applications, Engineering, Electrical & Electronic, Computer Science, Engineering, Helper data algorithm (HDA), key generation, physically unclonable function (PUF), FUZZY EXTRACTORS, ERROR-CORRECTION, SECURE, AUTHENTICATION, IMPLEMENTATION, BIOMETRICS, C16/15/058#53326573, 0906 Electrical and Electronic Engineering, 1006 Computer Hardware, Computer Hardware & Architecture, 4009 Electronics, sensors and digital hardware, 4607 Graphics, augmented reality and games

Abstract:

© 1982-2012 IEEE. Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. Third, we identify several hiatuses/open problems in existing literature.