An attack on PUF-Based session key exchange and a hardware-based countermeasure: erasable PUFs

  • Authors:
  • Ulrich Rührmair;Christian Jaeger;Michael Algasinger

  • Affiliations:
  • Computer Science Department, Technische Universität München, Garching, Germany;Walter Schottky Institut, Technische Universität München, Garching, Germany;Walter Schottky Institut, Technische Universität München, Garching, Germany

  • Venue:
  • FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We observe a security issue in protocols for session key exchange that are based on Strong Physical Unclonable Functions (PUFs). The problem is illustrated by cryptanalyzing a recent scheme of Tuyls and Skoric [1], which has been proposed for use in a bank card scenario. Under realistic assumptions, for example that the adversary Eve can eavesdrop the communication between the players and gains physical access to the PUF twice, she can derive previous session keys in this scheme. The observed problem seems to require the introduction of a new PUF variant, so-called "Erasable PUFs". Having defined this new primitive, we execute some first steps towards its practical implementation, and argue that Erasable PUFs could be implemented securely via ALILE-based crossbar structures.