{"title":"There ain't no plain key: A PUF based first-order side-channel resistant encryption construction","authors":"Marc Stöttinger, Bernhard Jungk","doi":"10.1109/ISICIR.2016.7829738","DOIUrl":null,"url":null,"abstract":"The confidentiality of all modern symmetric encryption schemes relies on the sealing of the secret key. Hence, it is crucial to secure the secret key or other sensitive credentials in protected memory such as a secure key storage. An alternative to a key storage is a physical unclonable function, which generates a unique secret key for each device online. But still, the secret might leak during intermediate processing when used in an encryption scheme. In this paper, we propose a encryption scheme, which uses keys generated by a blinded PUF. The unmasking of these keys is done during the encryption operation of the block cipher, instead of directly after key generation. As a side effect the entire scheme provides resistance against first-order power analysis attacks while only public credentials are need to be stored.","PeriodicalId":159343,"journal":{"name":"2016 International Symposium on Integrated Circuits (ISIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Symposium on Integrated Circuits (ISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISICIR.2016.7829738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The confidentiality of all modern symmetric encryption schemes relies on the sealing of the secret key. Hence, it is crucial to secure the secret key or other sensitive credentials in protected memory such as a secure key storage. An alternative to a key storage is a physical unclonable function, which generates a unique secret key for each device online. But still, the secret might leak during intermediate processing when used in an encryption scheme. In this paper, we propose a encryption scheme, which uses keys generated by a blinded PUF. The unmasking of these keys is done during the encryption operation of the block cipher, instead of directly after key generation. As a side effect the entire scheme provides resistance against first-order power analysis attacks while only public credentials are need to be stored.