The Wiretap Channel for Capacitive PUF-Based Security Enclosures

نویسندگان

چکیده

In order to protect devices from physical manipulations, protective security enclosures were developed. However, these battery-backed solutions come with a reduced lifetime, and have be actively continuously monitored. overcome drawbacks, batteryless capacitive based on Physical Unclonable Functions (PUFs) been developed that generate key-encryption-key (KEK) for decryption of the key chain. reproduce PUF-key reliably compensate effect noise environmental influences, generation includes error correction codes. drilling attacks aim at partially destroying enclosure also alter PUF-response are subjected same procedures. Correcting attack effects, however, is highly undesirable as it would destroy concept enclosure. general, designing codes such they provide tamper-sensitivity attacks, while still correcting effects challenging task. We tackle this problem by first analyzing behavior under external influences different post-processing parameters. From this, we derive system model PUF-based enclosure, construct wiretap channel implementation q-ary polar verify obtained scheme in Monte Carlo simulation demonstrate our achieves layer 100 bits 306 entropy PUF-secret. Through further develop bring them one step closer their commercial deployment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantic Security for the Wiretap Channel

The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is “noisier” than the channel from sender to receiver. It has developed in the Information and Coding (I&C) community over the last 30 years largely divorced from the parallel development of modern cryptography. Th...

متن کامل

Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security

We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of M messages, which are stored in N replicated and non-communicating databases. An external eavesdropper observes a fraction μn (of its choice) of the traffic exchanged between the nth database and the user. In addition ...

متن کامل

Lattice Codes for the Gaussian Wiretap Channel

We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve’s probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice code...

متن کامل

A Model for Adversarial Wiretap Channel

In wiretap model of secure communication, the goal is to provide (asymptotic) perfect secrecy and reliability over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted considerable attention in recent years because it captures eavesdroppi...

متن کامل

Wiretap Channel With Side Information

The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2022

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2022.i3.165-191