• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Side-channel analysis of PUFs and fuzzy extractors
 
  • Details
  • Full
Options
2011
Conference Paper
Title

Side-channel analysis of PUFs and fuzzy extractors

Abstract
Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated. For this purpose, we analysed the side-channel leakage of PUF architectures and fuzzy extractor implementations. We identified several attack vectors within common PUF constructions and introduce two side-channel attacks on fuzzy extractors. Our proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.
Author(s)
Merli, D.
Schuster, D.
Stumpf, F.
Sigl, G.
Mainwork
Trust and trustworthy computing. 4th international conference, TRUST 2011. Proceedings  
Conference
International Conference on Trust and Trustworthy Computing (TRUST) 2011  
File(s)
Download (2.05 MB)
Rights
Use according to copyright law
DOI
10.24406/publica-r-371626
10.1007/978-3-642-21599-5_3
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Keyword(s)
  • physical unclonable function

  • PUF

  • side-channel analysis

  • SCA

  • Fuzzy Extractor

  • helper data

  • FPGA

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024