Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2015/937

End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol

Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, and Moti Yung

Abstract

We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation. We show how to obtain efficient implementations for each of the building blocks of the protocol, including a fuzzy extractor with a novel helper-data construction technique, a truly random number generator (TRNG), and a pseudo-random function (PRF). The prototype is implemented on a SASEBO-GII board, using the on-board SRAM as the source of entropy for the PUF and the TRNG. We present three different implementations. The first two execute on a MSP430 soft-core processor and have a security level of 64-bit and 128-bit respectively. The third uses a hardware accelerator and has 128-bit security level. To our best knowledge, this work is the first effort to describe the end-to-end design and evaluation of a privacy-preserving PUF-based authentication protocol.

Note: A preliminary version of this paper appears in the proceedings of CHES 2015. This is the full version including the security proof against the proposed protocol.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A minor revision of an IACR publication in CHES 2015
Keywords
Physically Unclonable Functionauthenticationprivacy-preserving protocolimplementation
Contact author(s)
dmoriyam @ nict go jp
History
2015-11-11: revised
2015-09-28: received
See all versions
Short URL
https://ia.cr/2015/937
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/937,
      author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung},
      title = {End-to-end Design of a {PUF}-based Privacy Preserving Authentication Protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/937},
      year = {2015},
      url = {https://eprint.iacr.org/2015/937}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.