Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices

Saleh Mulhem, Mouadh Ayache, W. Adi
{"title":"Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices","authors":"Saleh Mulhem, Mouadh Ayache, W. Adi","doi":"10.1109/EST.2019.8806216","DOIUrl":null,"url":null,"abstract":"Physical Unclonable Functions PUFs were proposed about two decades ago for creating physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in implementation and less consistent in the re-identification process. The novel technique proposed in this work, converts (mutates) a non-volatile SoC FPGA device at low cost into a consistent clone-resistant unit. A true random generator triggers an internal smart program which creates/mutates internally (in a post-production single-event process) a permanent physical Secret Unknown Cipher (SUC) module. This is seen as an electronic “mutation” in a self-reconfiguring non-volatile-FPGA SoC environment. The created entity results with some unknown, however operational Cipher SUC. As the SUC structure is non-volatile, the unit becomes permanently clone-resistant if any later changes are irreversibly prohibited. A large cipher class based on mini-blocks of 4-bit mappings and bundle permutations making use of the FPGA 4-input LUT structures is created. To create an SUC within a device, a single cipher is randomly selected from the large class. As nobody knows the internally selected cipher, the resulting cipher-module is unknown and could serve as a hard to clone physical identity. A perfect secret is the one which nobody knows. Once it is possible to know, it becomes clonable. A sample use case protocol challenging the particular created cipher is shown how to securely identify the device. A sample prototype implementation scenario for the proposed cipher is presented using Microsemi SmartFusion2 SoC FPGA technology. Complexity, performance and security aspects of the resulting new system are discussed and evaluated.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Eighth International Conference on Emerging Security Technologies (EST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2019.8806216","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Physical Unclonable Functions PUFs were proposed about two decades ago for creating physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in implementation and less consistent in the re-identification process. The novel technique proposed in this work, converts (mutates) a non-volatile SoC FPGA device at low cost into a consistent clone-resistant unit. A true random generator triggers an internal smart program which creates/mutates internally (in a post-production single-event process) a permanent physical Secret Unknown Cipher (SUC) module. This is seen as an electronic “mutation” in a self-reconfiguring non-volatile-FPGA SoC environment. The created entity results with some unknown, however operational Cipher SUC. As the SUC structure is non-volatile, the unit becomes permanently clone-resistant if any later changes are irreversibly prohibited. A large cipher class based on mini-blocks of 4-bit mappings and bundle permutations making use of the FPGA 4-input LUT structures is created. To create an SUC within a device, a single cipher is randomly selected from the large class. As nobody knows the internally selected cipher, the resulting cipher-module is unknown and could serve as a hard to clone physical identity. A perfect secret is the one which nobody knows. Once it is possible to know, it becomes clonable. A sample use case protocol challenging the particular created cipher is shown how to securely identify the device. A sample prototype implementation scenario for the proposed cipher is presented using Microsemi SmartFusion2 SoC FPGA technology. Complexity, performance and security aspects of the resulting new system are discussed and evaluated.
用于物理抗克隆设备的基于小块的密码类
物理不可克隆功能puf是在大约二十年前提出的,用于创建物理不可克隆的VLSI单元。puf作为模拟结构,在实现上成本很高,并且在重新识别过程中一致性较差。这项工作中提出的新技术以低成本将非易失性SoC FPGA器件转换(突变)为一致的抗克隆单元。一个真正的随机生成器触发一个内部智能程序,该程序在内部(在后期单事件过程中)创建/变异一个永久的物理未知密码(SUC)模块。这被视为自重新配置非易失性fpga SoC环境中的电子“突变”。创建的实体产生一些未知的,但可操作的密码SUC。由于SUC结构是非易失性的,因此如果以后的任何更改被不可逆地禁止,则该单元将具有永久的克隆抗性。基于4位映射的小块和利用FPGA 4输入LUT结构的束排列,创建了一个大型密码类。为了在设备中创建SUC,从大类中随机选择一个密码。由于没有人知道内部选择的密码,因此产生的密码模块是未知的,可以作为难以克隆的物理身份。完美的秘密就是没有人知道的秘密。一旦有可能知道,它就变得可克隆。一个示例用例协议挑战特定创建的密码显示如何安全地识别设备。采用Microsemi SmartFusion2 SoC FPGA技术,给出了该密码的一个示例原型实现场景。讨论并评估了由此产生的新系统的复杂性、性能和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信