Author:
Frisch Christoph,Wilde Florian,Holzner Thomas,Pehl Michael
Abstract
AbstractHelper data algorithms reliably extract secrets from physical unclonable functions. The necessary helper data can leak information, though. One state-of-the-art approach to assess the remaining min-entropy is limited to homogeneous bias or correlation, not both. Another one extends this to only local bias without correlation but is limited to short code lengths. This work presents a new approach for determining the min-entropy based on convolving histograms. It provides a better bound and good approximation given arbitrary bias, more realistic correlation effects, and practically relevant code sizes. Experiments on real-world and synthetic data show the benefit of the new method compared with state-of-the-art ones. This work also facilitates a better understanding of how the error correction as post-processing impacts the min-entropy.
Funder
Federal Ministry of Education and Research of Germany
Technische Universität München
Publisher
Springer Science and Business Media LLC
Subject
General Engineering,Energy Engineering and Power Technology
Reference26 articles.
1. ISO/IEC 20897-1 (2020) Information security, cybersecurity and privacy protection - physically unclonable functions - part 1: Security requirements. Norm, International Organization for Standardization
2. ISO/IEC 20897-2 (2021) Information security, cybersecurity and privacy protection - physically unclonable functions - Part 2: Test and evaluation methods
3. Pehl M, Hiller M, Sigl G (2017) Secret key generation for physical unclonable functions. Information Theoretic Security and Privacy of Information Systems 362
4. Delvaux J, Gu D, Verbauwhede I, Hiller M, Yu M-DM (2016) Efficient fuzzy extraction of PUF-induced secrets: theory and applications. In: International Conference on Cryptographic Hardware and Embedded Systems. Springer
5. Wilde F, Frisch C, Pehl M (2019) Efficient bound for conditional min-entropy of physical unclonable functions beyond IID. In: International Workshop on Information Forensics and Security (WIFS). IEEE
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Response Entropy of APUFs;Journal of Hardware and Systems Security;2024-07-31