Physical unclonable function explained

A physical unclonable function (sometimes also called physically-unclonable function, which refers to a weaker security metric than a physical unclonable function), or PUF, is a physical object whose operation cannot be reproduced ("cloned") in physical way (by making another system using the same technology), that for a given input and conditions (challenge), provides a physically defined "digital fingerprint" output (response). that serves as a unique identifier, most often for a semiconductor device such as a microprocessor. PUFs are often based on unique physical variations occurring naturally during semiconductor manufacturing.[1] A PUF is a physical entity embodied in a physical structure. PUFs are implemented in integrated circuits, including FPGAs,[2] and can be used in applications with high-security requirements, more specifically cryptography, Internet of Things (IOT) devices [3] and privacy protection.[4]

History

Early references about systems that exploit the physical properties of disordered systems for authentication purposes date back to Bauder in 1983[5] and Simmons in 1984.[6] [7] Naccache and Frémanteau provided an authentication scheme in 1992 for memory cards.[8] PUFs were first formally proposed in a general fashion by Pappu in 2001,[9] under the name Physical One-Way Function (POWF), with the term PUF being coined in 2002,[10] whilst describing the first integrated PUF where, unlike PUFs based on optics, the measurement circuitry and the PUF are integrated onto the same electrical circuit (and fabricated on silicon).

Starting in 2010, PUF gained attention in the smartcard market as a promising way to provide "silicon fingerprints", creating cryptographic keys that are unique to individual smartcards.[11] [12]

PUFs are now established as a secure alternative to battery-backed storage of secret keys in commercial FPGAs, such as the Xilinx Zynq Ultrascale+,[13] and Altera Stratix 10.

Concept

PUFs depend on the uniqueness of their physical microstructure. This microstructure depends on random physical factors introduced during manufacturing. These factors are unpredictable and uncontrollable, which makes it virtually impossible to duplicate or clone the structure.

Rather than embodying a single cryptographic key, PUFs implement challenge–response authentication to evaluate this microstructure. When a physical stimulus is applied to the structure, it reacts in an unpredictable (but repeatable) way due to the complex interaction of the stimulus with the physical microstructure of the device. This exact microstructure depends on physical factors introduced during manufacture, which are unpredictable (like a fair coin). The applied stimulus is called the challenge, and the reaction of the PUF is called the response. A specific challenge and its corresponding response together form a challenge-response pair or CRP. The device's identity is established by the properties of the microstructure itself. As this structure is not directly revealed by the challenge-response mechanism, such a device is resistant to spoofing attacks.

Using a fuzzy extractor or the fuzzy commitment scheme that are provably suboptimal in terms of storage and privacy leakage amount or using nested polar codes that can be made asymptotically optimal, one can extract a unique strong cryptographic key from the physical microstructure.[14] The same unique key is reconstructed every time the PUF is evaluated.[15] [16] The challenge-response mechanism is then implemented using cryptography.

PUFs can be implemented with a very small hardware investment compared to other cryptographic primitives that provide unpredictable input/output behavior, such as pseudo-random functions. In some cases, PUFs can even be built from existing hardware with the right properties.

Unclonability means that each PUF device has a unique and unpredictable way of mapping challenges to responses, even if it was manufactured with the same process as a similar device, and it is infeasible to construct a PUF with the same challenge-response behavior as another given PUF because exact control over the manufacturing process is infeasible. Mathematical unclonability means that it should be very hard to compute an unknown response given the other CRPs or some of the properties of the random components from a PUF. This is because a response is created by a complex interaction of the challenge with many or all of the random components. In other words, given the design of the PUF system, without knowing all of the physical properties of the random components, the CRPs are highly unpredictable. The combination of physical and mathematical unclonability renders a PUF truly unclonable.[15] [17]

Note that a PUF is "unclonable" using the same physical implementation, but once a PUF key is extracted, there's generally no problem with cloning the key – the output of the PUF – using other means. For "strong PUFs" one can train a neural network on observed challenge-response pairs and use it to predict unobserved responses.

Because of these properties, PUFs can be used as a unique and untamperable device identifier. PUFs can also be used for secure key generation and storage and for a source of randomness.

Classification

Strong/Weak

Implicit/explicit

All implementations of a certain PUF within certain device are created uniformly using scalable processes. For example when a cryptoprocessor based on a silicon chip is produced, a lot of processors are created on the same silicon wafer. Foundry equipment applies the same operations to all the chips on a wafer and tries to do it as much reproducible as possible in order to have predictable and high performance and reliability characteristics within all the chips. Despite this there should be generated randomness to make PUF in each chip unique.

Intrinsic/extrinsic

Types

See main article: Types of physical unclonable function.

Over 40 types of PUF have been suggested.[18] These range from PUFs that evaluate an intrinsic element of a pre-existing integrated electronic system[19] to concepts that involve explicitly introducing random particle distributions to the surface of physical objects for authentication.[20] All PUFs are subject to environmental variations such as temperature, supply voltage and electromagnetic interference, which can affect their performance. Therefore, rather than just being random, the real power of a PUF is its ability to be different between devices but simultaneously to be the same under different environmental conditions on the same device.

Error correction

In many applications, it is important that the output is stable. If the PUF is used for a key in cryptographic algorithms, it is necessary that error correction be done to correct any errors caused by the underlying physical processes and reconstruct exactly the same key each time under all operating conditions. In principle there are two basic concepts: Pre-Processing and Post-Processing Error Correction Code (ECC).[21]

On-chip ECC units increase size, power, and data processing time overheads; they also expose vulnerabilities to power analysis attacks that attempt to model the PUF mathematically. Alternatively, some PUF designs like the EC-PUF do not require an on-chip ECC unit.[1]

Strategies have been developed which lead SRAM PUF to become more reliable over time without degrading the other PUF quality measures such as security and efficiency.[22]

Research at Carnegie Mellon University into various PUF implementations found that some error reduction techniques reduced errors in PUF response in a range of ~70 percent to ~100 percent.[23]

Research at the University of Massachusetts Amherst to improve the reliability of SRAM PUF-generated keys posited an error correction technique to reduce the error rate.[24]

Joint reliability–secrecy coding methods based on transform coding are used to obtain significantly higher reliabilities for each bit generated from a PUF such that low-complexity error-correcting codes such as BCH codes suffice to satisfy a block error probability constraint of 1 bit errors out of 1 billion bits.[25]

Nested polar codes are used for vector quantization and error correction jointly. Their performance is asymptotically optimal in terms of, for a given blocklength, the maximum number of secret bits generated, the minimum amount of private information leaked about the PUF outputs, and minimum storage required. The fuzzy commitment scheme and fuzzy extractors are shown to be suboptimal in terms of the minimum storage.[26]

Availability

Vulnerabilities

In 2011, university research showed that delay-based PUF implementations are vulnerable to side-channel attacks[36] and recommends that countermeasures be employed in the design to prevent this type of attack. Also, improper implementation of PUF could introduce "backdoors" to an otherwise secure system.[37] In June 2012, Dominik Merli, a scientist at Fraunhofer Research Institution for Applied and Integrated Security (AISEC) further claimed that PUF introduces more entry points for hacking into a cryptographic system and that further investigation into the vulnerabilities of PUFs is required before PUFs can be used in practical security-related applications.[38] The presented attacks are all on PUFs implemented in insecure systems, such as FPGA or Static RAM (SRAM). It is also important to ensure that the environment is suitable for the needed security level,[39] as otherwise attacks taking advantage of temperature and other variations may be possible.[40]

In 2015, some studies claimed it is possible to attack certain kinds of PUFs with low-cost equipment in a matter of milliseconds. A team at Ruhr Universität of Bochum, Germany, demonstrated a method to create a model of XOR Arbiter PUFs and thus be able to predict their response to any kind of challenge. Their method requires only 4 CRPs, which even on resource-constrained devices should not take more than about 200ms to produce. Using this method and a $25 device or an NFC-enabled smartphone, the team was able to successfully clone PUF-based RFID cards stored in the wallet of users while it was in their back pocket.[41]

Provable machine learning attacks

The attacks mentioned above range from invasive, e.g.,[42] to non-invasive attacks. One of the most celebrated types of non-invasive attacks is machine learning (ML) attacks. From the beginning of the era of PUFs, it has been doubted if these primitives are subject to this type of attacks.[43] In the lack of thorough analysis and mathematical proofs of the security of PUFs, ad hoc attacks against PUFs have been introduced in the literature. Consequently, countermeasures presented to cope with these attacks are less effective. In line with these efforts, it has been conjectured if PUFs can be considered as circuits, being provably hard to break.[44] In response, a mathematical framework has been suggested, where provable ML algorithms against several known families of PUFs have been introduced.[45]

Along with this provable ML framework, to assess the security of PUFs against ML attacks, property testing algorithms have been reintroduced in the hardware security community and made publicly accessible.[46] [47] These algorithms trace their roots back to well-established fields of research, namely property testing, machine learning theory, and Boolean analysis.

ML attacks can also apply to PUFs because most of the pre and post-processing methods applied until now ignore the effect of correlations between PUF-circuit outputs. For instance, obtaining one bit by comparing two ring oscillator outputs is a method to decrease the correlation. However, this method does not remove all correlations. Therefore, the classic transforms from the signal-processing literature are applied to raw PUF-circuit outputs to decorrelate them before quantizing the outputs in the transform domain to generate bit sequences. Such decorrelation methods can help to overcome the correlation-based information leakages about the PUF outputs even if the ambient temperature and supply voltage change.[48]

Optical PUFs

Optical PUFs rely on a random optical multiple-scattering medium, which serves as a token. Optical PUFs offer a promising approach to developing entity authentication schemes that are robust against many of the aforementioned attacks. However, their security against emulation attacks can be ensured only in the case of quantum readout (see below), or when the database of challenge-response pairs is somehow encrypted.[49]

Optical PUFs can be made very easily: a varnish containing glitter, a metallic paint, or a frosted finish obtained by sandblasting a surface, for example, are practically impossible to clone. Their appearance changes depending on the point of view and the lighting.

Authentication of an optical PUF requires a photographic acquisition to measure the luminosity of several of its parts and the comparison of this acquisition with another previously made from the same point of view. This acquisition must be supplemented by an additional acquisition either from another point of view, or under different lighting to verify that this results in a modification of the appearance of the PUF.

This can be done with a smartphone, without additional equipment, using optical means to determine the position in which the smartphone is in relation to the PUF.

Theoretical investigations suggest that optical PUFs with nonlinear multiple-scattering media, may be more robust than their linear counterparts against the potential cloning of the medium.[50]

See also

External links

Notes and References

  1. Kamal . Kamal Y. . Muresan . Radu . 2019 . Mixed-Signal Physically Unclonable Function With CMOS Capacitive Cells . IEEE Access . 7 . 130977–130998 . 10.1109/ACCESS.2019.2938729 . 2019IEEEA...7m0977K . 202766809 . 2169-3536. 10214/17525 . free .
  2. Book: Nozaki . Yusuke . Yoshikawa . Masaya . 2019 Cybersecurity and Cyberforensics Conference (CCC) . Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack . May 2019 . https://ieeexplore.ieee.org/document/8854557 . Melbourne, Australia . IEEE . 30–34 . 10.1109/CCC.2019.00-13 . 978-1-7281-2600-5. 203655491 .
  3. Josiah . J. G. . 2020 . The CCAP: A New Physical Unclonable Function (PUF) for Protecting Internet of Things (IoT) and Other FPGA-based Embedded Systems . ProQuest. Ph.D . .
  4. Book: Lipps . Christoph . Mallikarjun . Sachinkumar Bavikatti . Strufe . Matthias . Heinz . Christopher . Grimm . Christoph . Schotten . Hans Dieter . 2020 3rd International Conference on Data Intelligence and Security (ICDIS) . Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles . June 2020 . http://dx.doi.org/10.1109/icdis50059.2020.00019 . 93–100 . IEEE . 10.1109/icdis50059.2020.00019. 978-1-7281-9379-3 . 231683963 .
  5. D.W. Bauder, "An anti-counterfeiting concept for currency systems," Research report PTK-11990. Sandia National Labs. Albuquerque, NM, 1983.
  6. G. Simmons, "A system for verifying user identity and authorization at the point-of-sale or access," Cryptologia, vol. 8, no. 1, pp. 1–21, 1984.
  7. G. Simmons, "Identification of data, devices, documents, and individuals," in IEEE International Carnahan Conference on Security Technology, 1991, pp. 197–218.
  8. David Naccache and Patrice Frémanteau, Unforgeable identification device, identification device reader and method of identification, August 1992.http://v3.espacenet.com/publicationDetails/biblio?DB=EPODOC&adjacent=true&locale=en_gb&FT=D&date=19940223&CC=EP&NR=0583709A1&KC=A1
  9. Pappu . R. . Recht . B. . Taylor . J. . Gershenfeld . N. . 2002. Physical one-way functions . Science . 297 . 5589. 2026–2030 . 10.1126/science.1074376 . 12242435 . 2002Sci...297.2026P . 1721.1/45499 . free .
  10. Blaise Gassend, Dwaine Clarke, Marten van Dijk and Srinivas Devadas. Silicon Physical Random Functions. Proceedings of the Computer and Communications Security Conference, November 2002
  11. Web site: Clarke . Peter . London Calling: Security technology takes time . EE Times . UBM Tech Electronics . 22 February 2013 . 1 July 2013.
  12. News: NXP and Intrinsic-ID to raise smart chip security . EE Times . UBM Tech Electronics . 21 January 2010 . 1 July 2013.
  13. https://www.prnewswire.com/news-releases/xilinx-addresses-rigorous-security-demands-at-fifth-annual-working-group-for-broad-range-of-applications-300351291.html Xilinx Addresses Rigorous Security Demands at Fifth Annual Working Group for Broad Range of Applications
  14. Book: Tuyls . Pim . Šcorić . Boris . Kevenaar . Tom . 10.1007/978-1-84628-984-2 . Security with Noisy Data: Private Biometics, Secure Key Storage and Anti-counterfeiting . 2007 . Springer . 978-184628-983-5.
  15. Book: Maes . R. . Physically unclonable functions: Constructions, Properties and Applications . 2013 . Springer . 978-3-642-41395-7.
  16. https://www.maximintegrated.com/en/design/partners-and-technology/design-technology/chipdna-puf-technology.html "PUF Technology Overview"
  17. C. Herder, L. Ren, M. van Dijk, M-D. Yu, and S. Devadas, "Trapdoor Computational Fuzzy Extractors and Cryptographically-Secure Physical Unclonable Functions," IEEE Transactions on Dependable and Secure Computing, January 2017.
  18. McGrath . Thomas . Bagci . Ibrahim E. . Wang . Zhiming M. . Roedig . Utz . Young . Robert J. . A PUF taxonomy . Applied Physics Reviews . 2019 . 6 . 11303 . 011303 . 10.1063/1.5079407 . 2019ApPRv...6a1303M . free .
  19. Book: Helinski . R. . Acharyya . D. . Plusquellic . J. . Proceedings of the 46th Annual Design Automation Conference . A physical unclonable function defined using power distribution system equivalent resistance variations . 2009 . 676–681. 10.1145/1629911.1630089 . 9781605584973 . 2537549 .
  20. Chong . C. N. . Jiang . J. . Guo . L. . Anti-counterfeiting with a random pattern . Proceedings of Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) . 2008 . 146–153.
  21. C. Bohm, M. Hofer, and W. Pribyl, "A microcontroller SRAM-PUF," in Network and System Security (NSS), 2011 5th International Conference September 2011, pp. 269–273.
  22. Maes, R, and Van der Leest, V. "Countering the effects of silicon aging on SRAM PUFs", Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
  23. Bhargava, M. "Reliable, Secure, Efficient Physical Unclonable Functions", Carnegie Mellon University Research Showcase @ CMU, Pittsburgh, Pennsylvania, 2013
  24. Vijayakumar, A.; Patil, V.C.; and Kundu, S. "On Improving Reliability of SRAM-Based Physically Unclonable Functions", Journal of Low Power Electronics and Applications, 12 January 2017
  25. Gunlu, O.; Kernetzky, T.; Iscan, O.; Sidorenko, V.; Kramer, G.; and Schaefer, R. "Secure and Reliable Key Agreement with Physical Unclonable Functions", Entropy Journal, 3 May 2018
  26. Gunlu, O.; Iscan, O.; Sidorenko, V.; and Kramer, G. "Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems", IEEE Transactions on Information Forensics and Security, 15 April 2019
  27. Web site: Home . ememory.com.tw.
  28. Web site: PUFsecurity Secure the Connected World Taiwan. Pufsecurity. en. 2019-12-17.
  29. Web site: Enthentica Company Website. www.enthentica.com.
  30. https://www.intrinsic-id.com Intrinsic ID company website
  31. Web site: Physically Unclonable Functions . 2022-04-08 . Granite Mountain Technologies . en-US.
  32. https://www.militaryaerospace.com/computers/article/16716318/microsemi-to-offer-intrinsicid-security-in-fpgas-and-systemsonchip-for-sensitive-military-applications Microsemi to offer Intrinsic-ID security in FPGAs and systems-on-chip for sensitive military applications
  33. https://www.eetimes.com/document.asp?doc_id=1254886# NXP and Intrinsic-ID to raise smart chip security
  34. https://newsroom.intel.com/news-releases/altera-partners-intrinsic-id-develop-worlds-secure-high-end-fpga/#gs.0qyiip Altera Partners with Intrinsic-ID to Develop World’s Most Secure High-End FPGA
  35. Verayo PUF IP on Xilinx Zynq UltraScale+ MPSoC Devices Addresses Security Demands.
  36. Schuster . Dieter . Side-Channel Analysis of Physical Unclonable Functions (PUFs) . Diploma . . 2010 . 2013-06-28 . 2015-07-09 . https://web.archive.org/web/20150709073049/https://www.sec.in.tum.de/assets/studentwork/finished/Schuster2010.pdf . dead .
  37. Rührmair . Ulrich . van Dijk . Marten . PUFs in Security Protocols: Attack Models and Security Evaluations . 2013 IEEE Symposium on Security and Privacy . May 19–22, 2013 San Francisco, CA, USA . 2013 .
  38. Merli . Dominik . Hardware Attacks on PUFs . Proceedings AHS2012, NASA/ESA Conference on Adaptive Hardware and Systems. June 25 – 28, 2012 Erlangen, Germany. . 2012 . 2013-06-28 . 2015-06-10 . https://web.archive.org/web/20150610230403/http://www.see.ed.ac.uk/ahs2012/Tutorial_4_Part2.pdf . dead .
  39. Book: Christoph, Boehm . Physical Unclonable Functions in Theory and Practice . Springer. 2012 .
  40. Anagnostopoulos. N.A.. Arul . T. . Rosenstihl. M.. Schaller. A.. Gabmeyer. S.. Katzenbeisser. S. . 2019 . Attacking SRAM PUFs using very-low-temperature data remanence . Microprocessors and Microsystems . 71 . 102864. 10.1016/j.micpro.2019.102864. Kitsos. P.. Elsevier. 201138643. 0141-9331.
  41. Becker . Georg . Cryptographic Hardware and Embedded Systems -- CHES 2015 . The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs . Lecture Notes in Computer Science . Lecture Notes in Computer Science . 2015 . 9293 . 535–555 . 10.1007/978-3-662-48324-4_27 . 978-3-662-48323-7 . free .
  42. Helfmeier . Clemens . Nedospasov . Dmitry . Boit . Christian . Seifert . Jean-Pierre . Cloning Physically Unclonable Functions . IEEE Hardware Oriented Security and Trust (IEEE HOST 2013). June 2–3, 2013 Austin, TX, USA . 2013 . 2014-09-11 . 2016-08-01 . https://web.archive.org/web/20160801032523/http://users.sec.t-labs.tu-berlin.de/~nedos/host2013.pdf . dead .
  43. Book: Gassend. Blaise. Clarke. Dwaine. van Dijk. Marten. Devadas. Srinivas. Proceedings of the 9th ACM conference on Computer and communications security . Silicon physical random functions . 2002. 148–160 . New York, New York, USA. ACM Press. 10.1145/586110.586132. 978-1581136128. 10.1.1.297.5196. 1788365.
  44. Herder. Charles. Ren. Ling. van Dijk. Marten. Yu. Meng-Day. Devadas. Srinivas. 2017-01-01. Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Transactions on Dependable and Secure Computing. 14. 1. 65–82. 10.1109/tdsc.2016.2536609. 1545-5971. free.
  45. Book: Ganji, Fatemeh. On the learnability of physically unclonable functions. Springer. 2018. 978-3-319-76716-1.
  46. Web site: PUFmeter: A Property Testing Tool for Physically Unclonable Functions. Ganji. Fatemeh. 2018.
  47. Web site: Software Developed for the Trust-Hub Project (Available for Download). 2018.
  48. Gunlu, O.; Iscan, O.; and Kramer, G. "Reliable secret key generation from physical unclonable functions under varying environmental conditions", IEEE Workshop on Information Forensics and Security, 4 January 2016
  49. Nikolopoulos. Georgios M.. July 2021. Remote Quantum-Safe Authentication of Entities with Physical Unclonable Functions. Photonics. en. 8. 7. 289. 10.3390/photonics8070289. 2108.00468. 2021Photo...8..289N . free.
  50. Nikolopoulos . Georgios M. . 2022 . Effects of Kerr Nonlinearity in Physical Unclonable Functions . Applied Sciences . en . 12 . 23 . 11985 . 10.3390/app122311985 . 2076-3417. free . 2211.11499 .