Cryptographic Primitives from Physical Variables

" In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but a...

Full description

Bibliographic Details
Main Author: Hammouri, Ghaith
Other Authors: Berk Sunar, Advisor
Format: Others
Published: Digital WPI 2009
Subjects:
Online Access:https://digitalcommons.wpi.edu/etd-dissertations/304
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations
id ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-dissertations-1303
record_format oai_dc
spelling ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-dissertations-13032019-03-22T05:43:12Z Cryptographic Primitives from Physical Variables Hammouri, Ghaith " In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but are not due to manufacturing variability. In the first part of this dissertation, we focus our attention on scenarios which require the unique identification of physical objects and we show how Gaussian PVs can be used to fulfill such a requirement. Using this framework we present and analyze a new technique for fingerprinting compact discs (CDs) using the manufacturing variability found in the length of the CDs' lands and pits. Although the variability measured is on the order of 20 nm, the technique does not require the use of microscopes or any advanced equipment. Instead, the electrical signal produced by the photo-detector inside the CD reader will be sufficient to measure the desired variability. We thoroughly investigate the new technique by analyzing data collected from 100 identical CDs and show how to extract a unique fingerprint for each CD. In the second part, we shift our attention to physically parameterized functions (PPFs). Although all the constructions we provide are centered around delay-based physically unclonable functions (PUFs), we stress that the use of the term PUF could be misleading as most circuits labeled with the term PUF are in reality clonable on the protocol level. We argue that using a term like PPFs to describe functions parameterized by a PV is a more accurate description. Herein, we thoroughly analyze delay-PUFs and use a mathematical framework to construct two authentication protocols labeled PUF-HB and HB+PUF. Both these protocols merge the known HB authentication family with delay-based PUFs. The new protocols enjoy the security reduction put forth by the HB portion of the protocol and at the same time maintain a level of hardware security provided by the use of PUFs. We present a proof of concept implementation for HB+PUF which takes advantage of the PUF circuit in order to produce the random bits typically needed for an HB-based authentication scheme. The overall circuit is shown to occupy a few thousand gates. Finally, we present a new authentication protocol that uses 2-level PUF circuits and enables a security reduction which, unlike the previous two protocols, stems naturally from the usage of PVs. " 2009-06-02T07:00:00Z text application/pdf https://digitalcommons.wpi.edu/etd-dissertations/304 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations Doctoral Dissertations (All Dissertations, All Years) Digital WPI Berk Sunar, Advisor Christof Paar, Committee Member William J. Martin, Committee Member Daniel J. Dougherty, Committee Member David Cyganski, Committee Member Fred J. Looft, Department Head Cryptography Physically Unclonable Functions (PUFs) Physical Variables.
collection NDLTD
format Others
sources NDLTD
topic Cryptography
Physically Unclonable Functions (PUFs)
Physical Variables.
spellingShingle Cryptography
Physically Unclonable Functions (PUFs)
Physical Variables.
Hammouri, Ghaith
Cryptographic Primitives from Physical Variables
description " In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but are not due to manufacturing variability. In the first part of this dissertation, we focus our attention on scenarios which require the unique identification of physical objects and we show how Gaussian PVs can be used to fulfill such a requirement. Using this framework we present and analyze a new technique for fingerprinting compact discs (CDs) using the manufacturing variability found in the length of the CDs' lands and pits. Although the variability measured is on the order of 20 nm, the technique does not require the use of microscopes or any advanced equipment. Instead, the electrical signal produced by the photo-detector inside the CD reader will be sufficient to measure the desired variability. We thoroughly investigate the new technique by analyzing data collected from 100 identical CDs and show how to extract a unique fingerprint for each CD. In the second part, we shift our attention to physically parameterized functions (PPFs). Although all the constructions we provide are centered around delay-based physically unclonable functions (PUFs), we stress that the use of the term PUF could be misleading as most circuits labeled with the term PUF are in reality clonable on the protocol level. We argue that using a term like PPFs to describe functions parameterized by a PV is a more accurate description. Herein, we thoroughly analyze delay-PUFs and use a mathematical framework to construct two authentication protocols labeled PUF-HB and HB+PUF. Both these protocols merge the known HB authentication family with delay-based PUFs. The new protocols enjoy the security reduction put forth by the HB portion of the protocol and at the same time maintain a level of hardware security provided by the use of PUFs. We present a proof of concept implementation for HB+PUF which takes advantage of the PUF circuit in order to produce the random bits typically needed for an HB-based authentication scheme. The overall circuit is shown to occupy a few thousand gates. Finally, we present a new authentication protocol that uses 2-level PUF circuits and enables a security reduction which, unlike the previous two protocols, stems naturally from the usage of PVs. "
author2 Berk Sunar, Advisor
author_facet Berk Sunar, Advisor
Hammouri, Ghaith
author Hammouri, Ghaith
author_sort Hammouri, Ghaith
title Cryptographic Primitives from Physical Variables
title_short Cryptographic Primitives from Physical Variables
title_full Cryptographic Primitives from Physical Variables
title_fullStr Cryptographic Primitives from Physical Variables
title_full_unstemmed Cryptographic Primitives from Physical Variables
title_sort cryptographic primitives from physical variables
publisher Digital WPI
publishDate 2009
url https://digitalcommons.wpi.edu/etd-dissertations/304
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations
work_keys_str_mv AT hammourighaith cryptographicprimitivesfromphysicalvariables
_version_ 1719005534482333696