没有纯密钥:一种基于PUF的一阶抗侧信道加密结构

Marc Stöttinger, Bernhard Jungk
{"title":"没有纯密钥:一种基于PUF的一阶抗侧信道加密结构","authors":"Marc Stöttinger, Bernhard Jungk","doi":"10.1109/ISICIR.2016.7829738","DOIUrl":null,"url":null,"abstract":"The confidentiality of all modern symmetric encryption schemes relies on the sealing of the secret key. Hence, it is crucial to secure the secret key or other sensitive credentials in protected memory such as a secure key storage. An alternative to a key storage is a physical unclonable function, which generates a unique secret key for each device online. But still, the secret might leak during intermediate processing when used in an encryption scheme. In this paper, we propose a encryption scheme, which uses keys generated by a blinded PUF. The unmasking of these keys is done during the encryption operation of the block cipher, instead of directly after key generation. As a side effect the entire scheme provides resistance against first-order power analysis attacks while only public credentials are need to be stored.","PeriodicalId":159343,"journal":{"name":"2016 International Symposium on Integrated Circuits (ISIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"There ain't no plain key: A PUF based first-order side-channel resistant encryption construction\",\"authors\":\"Marc Stöttinger, Bernhard Jungk\",\"doi\":\"10.1109/ISICIR.2016.7829738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The confidentiality of all modern symmetric encryption schemes relies on the sealing of the secret key. Hence, it is crucial to secure the secret key or other sensitive credentials in protected memory such as a secure key storage. An alternative to a key storage is a physical unclonable function, which generates a unique secret key for each device online. But still, the secret might leak during intermediate processing when used in an encryption scheme. In this paper, we propose a encryption scheme, which uses keys generated by a blinded PUF. The unmasking of these keys is done during the encryption operation of the block cipher, instead of directly after key generation. As a side effect the entire scheme provides resistance against first-order power analysis attacks while only public credentials are need to be stored.\",\"PeriodicalId\":159343,\"journal\":{\"name\":\"2016 International Symposium on Integrated Circuits (ISIC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Symposium on Integrated Circuits (ISIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISICIR.2016.7829738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Symposium on Integrated Circuits (ISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISICIR.2016.7829738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

所有现代对称加密方案的机密性都依赖于密钥的密封。因此,在受保护的内存(如安全密钥存储)中保护密钥或其他敏感凭据是至关重要的。密钥存储的替代方案是物理不可克隆功能,它为每个在线设备生成唯一的密钥。但是,当在加密方案中使用时,秘密可能会在中间处理期间泄漏。本文提出了一种使用盲PUF生成密钥的加密方案。这些密钥的解密是在分组密码的加密操作期间完成的,而不是直接在密钥生成之后。作为一个副作用,整个方案提供了抵抗一阶功率分析攻击的能力,而只需要存储公共凭证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
There ain't no plain key: A PUF based first-order side-channel resistant encryption construction
The confidentiality of all modern symmetric encryption schemes relies on the sealing of the secret key. Hence, it is crucial to secure the secret key or other sensitive credentials in protected memory such as a secure key storage. An alternative to a key storage is a physical unclonable function, which generates a unique secret key for each device online. But still, the secret might leak during intermediate processing when used in an encryption scheme. In this paper, we propose a encryption scheme, which uses keys generated by a blinded PUF. The unmasking of these keys is done during the encryption operation of the block cipher, instead of directly after key generation. As a side effect the entire scheme provides resistance against first-order power analysis attacks while only public credentials are need to be stored.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信