Secure and ligthweight hardware authentication systems based on physical unclonable functions

  1. Eiroa Lorenzo, Susana
Dirixida por:
  1. Iluminada Baturone Castillo Director

Universidade de defensa: Universidad de Sevilla

Fecha de defensa: 21 de marzo de 2014

Tribunal:
  1. Francisco Javier González Castaño Presidente
  2. Antonio José Acosta Jiménez Secretario/a
  3. Raúl Jiménez Vogal
  4. Ahmad Reza Sadeghi Vogal
  5. Eduardo Torre Arnanz Vogal

Tipo: Tese

Teseo: 353949 DIALNET

Resumo

This Dissertation focuses on the authentication of hardware by using Physical Unclonable Functions (PUFs), which avoid device cloning and are able to generate secrets on the fly instead of storing them. Structures based on ring oscillators (ROs) and standard static random access memories (SRAMs) reported in the literature have been analyzed in detail to evaluate their advantages and drawbacks mainly concerning uniqueness and reliability. RO PUFs have been characterized experimentally in FPGAs from Xilinx while SRAM PUFs have been characterized in ASICs fabricated with TSMC 90 nm technology. A novel real-valued RO PUF is proposed to overcome the problems observed, in particular when the number of ring oscillators is small. It is more robust against surrounding logic and it is less affected by temperature and power supply variations. According to the metrics employed in these real-valued RO PUFs, a new real-valued shielding function is proposed to generate secrets. In addition, real-valued RO PUFs are also exploited to work as true random number generators (TRNGs). A novel SRAM-based solution is proposed which is under confidentiality. A lightweight authentication system based on a symmetric-key challengeresponse protocol that uses the mixed PUF-TRNG structures analyzed is developed. Although the secret key is not stored but processed on the fly, the hardware blocks leak information about the data that are computed in each instant. Hence, the security of the system is studied not only from a mathematical point of view but also from its resistance to hardware (physical) attacks. In particular, a Differential Power Analysis (DPA) attack is developed and carried out against the system in a real scenario. Experimental results show how many interchanged messages are needed to extract the secret successfully.