Towards security without secrets
نویسنده
چکیده
Physical Unclonable Functions (PUFs) are a promising new cryptographic primitive that leverage manufacturing variation to create unclonable secrets in embedded systems. In this case, the secret is no longer stored permanently in digital form, but rather as the physical properties of the manufactured chip. Further, the recent proposal of "Public Model Physical Unclonable Functions" (PPUFs) does not contain any secrets at all. Instead, PPUFs propose to use a constant-factor computational speedup to distinguish an unclonable hardware device from a digital simulation. This thesis presents a new computational fuzzy extractor and stateless PUF leveraging Learning Parity with Noise (LPN). This method significantly improves over the state-of-the-art in extracting stable secrets from PUFs and has a clear security reduction to a well-accepted cryptographic assumption (LPN). In addition, this dissertation proposes for the first time a formalism describing Public Model Physical Unclonable Functions based on ordinary differential equations (ODEs), a conjecture on the form of ODE integrators, and a formal reduction of PPUF security to this conjecture. This result is extended to compare analog and digital computing more generally. Finally, this thesis provides direction for implementing a PPUF. Thesis Supervisor: Srinivas Devadas Title: Professor of Electrical Engineering and Computer Science
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملPolygraphing Processes: N-Variant System Structures for Secretless Security
We describe a technique for hardening services that may contain unknown security vulnerabilities. We employ artificial diversity techniques, but in contrast to previous approaches that rely on keeping secrets to provide probabilistic security properties, we develop an architectural framework that provides a high degree of assurance without needing any secrets. The framework requires an attacker...
متن کاملA Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non-repudiation and anonymity. Our framework is based on two physical primitives: collaborative jamming and spatial signature enforcement. Notably, it eschews the use of shared secrets, while providing a cryptosystem th...
متن کاملمسؤولیت مدنی ناشی از افشای اسرار پزشکی در حقوق ایران و کامنلا
Revealing medical secrets is one of the most important topics in medical law, and has an ancient root in medical history and morality. Keeping patients' secrets is one of the certain laws in internal and international laws and regulations of the most countries that have been recognized in patients' bill of rights. Keeping patients' secrets causes patients to confide in physicians and refer to t...
متن کاملThe Biometric Daemon: A Public Perspective
Information privacy is maintained through authentication—the act of proving to a system that you are who you say you are. Unfortunately, current authentication methods are affected by a range of usability problems that impact significantly on the security of people’s data and access to secure systems. Recently, an experience-oriented security device, the Biometric Daemon, has been proposed whic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016