Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes

作者: Mario Barbareschi , Salvatore Barone , Antonino Mazzeo , Nicola Mazzocca

DOI: 10.1109/DTIS.2019.8735029

关键词:

摘要: Nowadays, physical tampering and counterfeiting of electronic devices are still an important security problem have a great impact on large-scale distributed applications, such as Internet-of-Things. Physical Unclonable Functions (PUFs) the potential to be fundamental means guarantee intrinsic hardware security, since they promise immunity against most known attack models. However, inner nature PUF circuits hinders wider adoption responses turn out noisy not stable during time. To overcome this issue, implementations require fuzzy extraction scheme, able recover stability by exploiting error correction codes (ECCs). In paper, we propose Reed-Muller (RM) ECC design, meant embedded into extractor, that can efficiently configured in terms area/delay constraints order get reliable from PUFs. We provide implementation details experimental evidences efficiency through syntheses medium-range FPGA device.

参考文章(10)
Matthias Hiller, Ludwig Kurzinger, Georg Sigl, Sven Muelich, Sven Puchinger, Martin Bossert, Low-Area Reed Decoding in a Generalized Concatenated Code Construction for PUFs 2015 IEEE Computer Society Annual Symposium on VLSI. pp. 143- 148 ,(2015) , 10.1109/ISVLSI.2015.31
D. E. Muller, Application of Boolean algebra to switching circuit design and to error detection Transactions of the I.R.E. Professional Group on Electronic Computers. ,vol. 3, pp. 6- 12 ,(1954) , 10.1109/IREPGELC.1954.6499441
Miaoqing Huang, Shiming Li, A Delay-based PUF Design Using Multiplexers on FPGA 2013 IEEE 21st Annual International Symposium on Field-Programmable Custom Computing Machines. pp. 226- 226 ,(2013) , 10.1109/FCCM.2013.11
Jason H. Anderson, A PUF design for secure FPGA-based embedded systems asia and south pacific design automation conference. pp. 1- 6 ,(2010) , 10.5555/1899721.1899723
I. Reed, A class of multiple-error-correcting codes and the decoding scheme Transactions of the IRE Professional Group on Information Theory. ,vol. 4, pp. 38- 49 ,(1954) , 10.1109/TIT.1954.1057465
K.G. Paterson, A.E. Jones, Efficient decoding algorithms for generalized Reed-Muller codes IEEE Transactions on Communications. ,vol. 48, pp. 1272- 1285 ,(2000) , 10.1109/26.864165
Ravikanth Pappu, Ben Recht, Jason Taylor, Neil Gershenfeld, None, Physical One-Way Functions Science. ,vol. 297, pp. 2026- 2030 ,(2002) , 10.1126/SCIENCE.1074376
Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo, Authenticating IoT Devices with Physically Unclonable Functions Models 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). pp. 563- 567 ,(2015) , 10.1109/3PGCIC.2015.117
Yevgeniy Dodis, Leonid Reyzin, Adam Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data theory and application of cryptographic techniques. pp. 523- 540 ,(2004) , 10.1007/978-3-540-24676-3_31
Ramprasad Saptharishi, Amir Shpilka, Ben Lee Volk, Efficiently Decoding Reed–Muller Codes From Random Errors IEEE Transactions on Information Theory. ,vol. 63, pp. 1954- 1960 ,(2017) , 10.1109/TIT.2017.2671410