A Provably Secure Strong PUF Based on LWE: Construction and Implementation
نویسندگان
چکیده
We construct a strong physical unclonable function (PUF) with provable security against machine learning (ML) attacks on both classical and quantum computers. The is guaranteed by the cryptographic hardness of decryption functions public-key cryptosystems, learning-with-errors (LWE) problem defined integer lattices. call our construction lattice PUF. PUF physically obfuscated key an LWE block. To allow deployments in different scenarios, we demonstrate designs latency-area trade-offs. A compact design uses highly serialized linear-feedback shift register (LFSR) function, while latency-optimized unrolled LFSR parallel datapath. prototype $2^{136}$ challenge-response pairs (CRPs) spartan 6 field-programmable gate array (FPGA). In addition to theoretical guarantee, evaluate empirical resistance various leading ML techniques: prediction error remains above notation="LaTeX">$49.76\%$ after 1 million training CRPs. resource-efficient requires only 45 slices for logic proper, 27 reverse fuzzy extractor. achieves notation="LaTeX">$148X$ reduction latency, at notation="LaTeX">$10X$ increase hardware utilization. mean uniformity responses notation="LaTeX">$49.98\%$ , uniqueness notation="LaTeX">$50.00\%$ reliability notation="LaTeX">$1.26\%$ .
منابع مشابه
Provably Secure LWE-Encryption with Uniform Secret
In this paper we present the (to the best of our knowledge) first LWE-based encryption scheme that removes the need of Gaussian sampling for the error, i.e. the discrete Gaussian distribution is replaced by the uniform distribution on a (small) set, which at the same time preserves the underlying worst-case hardness. This shows that provable security and efficiency do not necessarily have to mu...
متن کاملUNBIAS PUF: A Physical Implementation Bias Agnostic Strong PUF
The Physical Unclonable Function (PUF) is a promising hardware security primitive because of its inherent uniqueness and low cost. To extract the device-specific variation from delay-based strong PUFs, complex routing constraints are imposed to achieve symmetric path delays; and systematic variations can severely compromise the uniqueness of the PUF. In addition, the metastability of the arbite...
متن کاملProvably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric cryptographic implementations against DPA is to use masking techniques. However, clever masking of non-linear parts such as S-Boxes is difficult and has been the flaw of many countermeasures. In this article, we take ...
متن کاملImplementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with o...
متن کاملconstruction and validation of a computerized adaptive translation test (a receptive based study)
آزمون انطباقی رایانه ای (cat) روشی نوین برای سنجش سطح علمی دانش آموزان می باشد. در حقیقت آزمون های رایانه ای با سرعت بالایی به سمت و سوی جایگزین عملی برای آزمون های کاغذی می روند (کینگزبری، هاوسر، 1993). مقاله حاضر به دنبال آزمون انطباقی رایانه ای برای ترجمه می باشد. بدین منظور دو پرسشنامه مشتمل بر 55 تست ترجمه میان 102 آزمودنی و 10 مدرس زبان انگلیسی پخش گردید. پرسشنامه اول میان 102 دانشجوی س...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computers
سال: 2023
ISSN: ['1557-9956', '2326-3814', '0018-9340']
DOI: https://doi.org/10.1109/tc.2022.3207119