Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Side-channel analysis of PUFs and fuzzy extractors

: Merli, D.; Schuster, D.; Stumpf, F.; Sigl, G.

Preprint urn:nbn:de:0011-n-1743956 (2.0 MByte PDF)
MD5 Fingerprint: 653f05b29bda79fff728be5e2a28fcbb
The original publication is available at
Erstellt am: 20.7.2011

McCune, J.M.; Balacheff, B.; Perrig, A.; Sadeghi, A.-R.; Sasse, A.; Beres, Y.:
Trust and trustworthy computing. 4th international conference, TRUST 2011. Proceedings : Pittsburgh, PA, USA, June 22-24, 2011
Berlin: Springer, 2011 (Lecture Notes in Computer Science 6740)
ISBN: 3-642-21598-X
ISBN: 978-3-642-21598-8 (Print)
ISBN: 978-3-642-21599-5
ISSN: 0302-9743
International Conference on Trust and Trustworthy Computing (TRUST) <4, 2011, Pittsburgh/Pa.>
Konferenzbeitrag, Elektronische Publikation
Fraunhofer SIT ()
physical unclonable function; PUF; side-channel analysis; SCA; Fuzzy Extractor; helper data; FPGA

Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated. For this purpose, we analysed the side-channel leakage of PUF architectures and fuzzy extractor implementations. We identified several attack vectors within common PUF constructions and introduce two side-channel attacks on fuzzy extractors. Our proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.