The Wiretap Channel for Capacitive PUF-Based Security Enclosures
نویسندگان
چکیده
In order to protect devices from physical manipulations, protective security enclosures were developed. However, these battery-backed solutions come with a reduced lifetime, and have be actively continuously monitored. overcome drawbacks, batteryless capacitive based on Physical Unclonable Functions (PUFs) been developed that generate key-encryption-key (KEK) for decryption of the key chain. reproduce PUF-key reliably compensate effect noise environmental influences, generation includes error correction codes. drilling attacks aim at partially destroying enclosure also alter PUF-response are subjected same procedures. Correcting attack effects, however, is highly undesirable as it would destroy concept enclosure. general, designing codes such they provide tamper-sensitivity attacks, while still correcting effects challenging task. We tackle this problem by first analyzing behavior under external influences different post-processing parameters. From this, we derive system model PUF-based enclosure, construct wiretap channel implementation q-ary polar verify obtained scheme in Monte Carlo simulation demonstrate our achieves layer 100 bits 306 entropy PUF-secret. Through further develop bring them one step closer their commercial deployment.
منابع مشابه
Semantic Security for the Wiretap Channel
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is “noisier” than the channel from sender to receiver. It has developed in the Information and Coding (I&C) community over the last 30 years largely divorced from the parallel development of modern cryptography. Th...
متن کاملPrivate Information Retrieval Through Wiretap Channel II: Privacy Meets Security
We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of M messages, which are stored in N replicated and non-communicating databases. An external eavesdropper observes a fraction μn (of its choice) of the traffic exchanged between the nth database and the user. In addition ...
متن کاملLattice Codes for the Gaussian Wiretap Channel
We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve’s probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice code...
متن کاملA Model for Adversarial Wiretap Channel
In wiretap model of secure communication, the goal is to provide (asymptotic) perfect secrecy and reliability over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted considerable attention in recent years because it captures eavesdroppi...
متن کاملWiretap Channel With Side Information
The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2022
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2022.i3.165-191