Cryptographic Primitives from Physical Variables
" In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but a...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Digital WPI
2009
|
Subjects: | |
Online Access: | https://digitalcommons.wpi.edu/etd-dissertations/304 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations |
id |
ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-dissertations-1303 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-dissertations-13032019-03-22T05:43:12Z Cryptographic Primitives from Physical Variables Hammouri, Ghaith " In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but are not due to manufacturing variability. In the first part of this dissertation, we focus our attention on scenarios which require the unique identification of physical objects and we show how Gaussian PVs can be used to fulfill such a requirement. Using this framework we present and analyze a new technique for fingerprinting compact discs (CDs) using the manufacturing variability found in the length of the CDs' lands and pits. Although the variability measured is on the order of 20 nm, the technique does not require the use of microscopes or any advanced equipment. Instead, the electrical signal produced by the photo-detector inside the CD reader will be sufficient to measure the desired variability. We thoroughly investigate the new technique by analyzing data collected from 100 identical CDs and show how to extract a unique fingerprint for each CD. In the second part, we shift our attention to physically parameterized functions (PPFs). Although all the constructions we provide are centered around delay-based physically unclonable functions (PUFs), we stress that the use of the term PUF could be misleading as most circuits labeled with the term PUF are in reality clonable on the protocol level. We argue that using a term like PPFs to describe functions parameterized by a PV is a more accurate description. Herein, we thoroughly analyze delay-PUFs and use a mathematical framework to construct two authentication protocols labeled PUF-HB and HB+PUF. Both these protocols merge the known HB authentication family with delay-based PUFs. The new protocols enjoy the security reduction put forth by the HB portion of the protocol and at the same time maintain a level of hardware security provided by the use of PUFs. We present a proof of concept implementation for HB+PUF which takes advantage of the PUF circuit in order to produce the random bits typically needed for an HB-based authentication scheme. The overall circuit is shown to occupy a few thousand gates. Finally, we present a new authentication protocol that uses 2-level PUF circuits and enables a security reduction which, unlike the previous two protocols, stems naturally from the usage of PVs. " 2009-06-02T07:00:00Z text application/pdf https://digitalcommons.wpi.edu/etd-dissertations/304 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations Doctoral Dissertations (All Dissertations, All Years) Digital WPI Berk Sunar, Advisor Christof Paar, Committee Member William J. Martin, Committee Member Daniel J. Dougherty, Committee Member David Cyganski, Committee Member Fred J. Looft, Department Head Cryptography Physically Unclonable Functions (PUFs) Physical Variables. |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Cryptography Physically Unclonable Functions (PUFs) Physical Variables. |
spellingShingle |
Cryptography Physically Unclonable Functions (PUFs) Physical Variables. Hammouri, Ghaith Cryptographic Primitives from Physical Variables |
description |
" In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but are not due to manufacturing variability. In the first part of this dissertation, we focus our attention on scenarios which require the unique identification of physical objects and we show how Gaussian PVs can be used to fulfill such a requirement. Using this framework we present and analyze a new technique for fingerprinting compact discs (CDs) using the manufacturing variability found in the length of the CDs' lands and pits. Although the variability measured is on the order of 20 nm, the technique does not require the use of microscopes or any advanced equipment. Instead, the electrical signal produced by the photo-detector inside the CD reader will be sufficient to measure the desired variability. We thoroughly investigate the new technique by analyzing data collected from 100 identical CDs and show how to extract a unique fingerprint for each CD. In the second part, we shift our attention to physically parameterized functions (PPFs). Although all the constructions we provide are centered around delay-based physically unclonable functions (PUFs), we stress that the use of the term PUF could be misleading as most circuits labeled with the term PUF are in reality clonable on the protocol level. We argue that using a term like PPFs to describe functions parameterized by a PV is a more accurate description. Herein, we thoroughly analyze delay-PUFs and use a mathematical framework to construct two authentication protocols labeled PUF-HB and HB+PUF. Both these protocols merge the known HB authentication family with delay-based PUFs. The new protocols enjoy the security reduction put forth by the HB portion of the protocol and at the same time maintain a level of hardware security provided by the use of PUFs. We present a proof of concept implementation for HB+PUF which takes advantage of the PUF circuit in order to produce the random bits typically needed for an HB-based authentication scheme. The overall circuit is shown to occupy a few thousand gates. Finally, we present a new authentication protocol that uses 2-level PUF circuits and enables a security reduction which, unlike the previous two protocols, stems naturally from the usage of PVs. " |
author2 |
Berk Sunar, Advisor |
author_facet |
Berk Sunar, Advisor Hammouri, Ghaith |
author |
Hammouri, Ghaith |
author_sort |
Hammouri, Ghaith |
title |
Cryptographic Primitives from Physical Variables |
title_short |
Cryptographic Primitives from Physical Variables |
title_full |
Cryptographic Primitives from Physical Variables |
title_fullStr |
Cryptographic Primitives from Physical Variables |
title_full_unstemmed |
Cryptographic Primitives from Physical Variables |
title_sort |
cryptographic primitives from physical variables |
publisher |
Digital WPI |
publishDate |
2009 |
url |
https://digitalcommons.wpi.edu/etd-dissertations/304 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1303&context=etd-dissertations |
work_keys_str_mv |
AT hammourighaith cryptographicprimitivesfromphysicalvariables |
_version_ |
1719005534482333696 |