Information Theoretic Analysis of PUF-Based Tamper Protection

PUFs enable physical tamper protection for high-assurance devices without needing a continuous power supply that is active over the entire lifetime of the device. Several methods for PUF-based tamper protection have been proposed together with practical quantization and error correction schemes. In...

Full description

Saved in:
Bibliographic Details
Main Authors: Georg Maringer, Matthias Hiller
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2025-03-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/12059
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850072162231123968
author Georg Maringer
Matthias Hiller
author_facet Georg Maringer
Matthias Hiller
author_sort Georg Maringer
collection DOAJ
description PUFs enable physical tamper protection for high-assurance devices without needing a continuous power supply that is active over the entire lifetime of the device. Several methods for PUF-based tamper protection have been proposed together with practical quantization and error correction schemes. In this work we take a step back from the implementation to analyze theoretical properties and limits. We apply zero leakage output quantization to existing quantization schemes and minimize the reconstruction error probability under zero leakage. We apply wiretap coding within a helper data algorithm to enable a reliable key reconstruction for the legitimate user while guaranteeing a selectable reconstruction complexity for an attacker, analogously to the security level for a cryptographic algorithm for the attacker models considered in this work. We present lower bounds on the achievable key rates depending on the attacker’s capabilities in the asymptotic and finite blocklength regime to give fundamental security guarantees even if the attacker gets partial information about the PUF response and the helper data. Furthermore, we present converse bounds on the number of PUF cells. Our results show for example that for a practical scenario one needs at least 459 PUF cells using 3 bit quantization to achieve a security level of 128 bit.
format Article
id doaj-art-6d4e0ab5fdab40cfb1b1ac53ec23d078
institution DOAJ
issn 2569-2925
language English
publishDate 2025-03-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj-art-6d4e0ab5fdab40cfb1b1ac53ec23d0782025-08-20T02:47:07ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252025-03-012025210.46586/tches.v2025.i2.604-646Information Theoretic Analysis of PUF-Based Tamper ProtectionGeorg Maringer0Matthias Hiller1Technical University of Munich, Munich, Germany; Fraunhofer AISEC, Garching, GermanyFraunhofer AISEC, Garching, Germany PUFs enable physical tamper protection for high-assurance devices without needing a continuous power supply that is active over the entire lifetime of the device. Several methods for PUF-based tamper protection have been proposed together with practical quantization and error correction schemes. In this work we take a step back from the implementation to analyze theoretical properties and limits. We apply zero leakage output quantization to existing quantization schemes and minimize the reconstruction error probability under zero leakage. We apply wiretap coding within a helper data algorithm to enable a reliable key reconstruction for the legitimate user while guaranteeing a selectable reconstruction complexity for an attacker, analogously to the security level for a cryptographic algorithm for the attacker models considered in this work. We present lower bounds on the achievable key rates depending on the attacker’s capabilities in the asymptotic and finite blocklength regime to give fundamental security guarantees even if the attacker gets partial information about the PUF response and the helper data. Furthermore, we present converse bounds on the number of PUF cells. Our results show for example that for a practical scenario one needs at least 459 PUF cells using 3 bit quantization to achieve a security level of 128 bit. https://tches.iacr.org/index.php/TCHES/article/view/12059Physical Unclonable FunctionsTamper ProtectionError CorrectionWiretap ChannelSecret SharingPhysical Layer Security
spellingShingle Georg Maringer
Matthias Hiller
Information Theoretic Analysis of PUF-Based Tamper Protection
Transactions on Cryptographic Hardware and Embedded Systems
Physical Unclonable Functions
Tamper Protection
Error Correction
Wiretap Channel
Secret Sharing
Physical Layer Security
title Information Theoretic Analysis of PUF-Based Tamper Protection
title_full Information Theoretic Analysis of PUF-Based Tamper Protection
title_fullStr Information Theoretic Analysis of PUF-Based Tamper Protection
title_full_unstemmed Information Theoretic Analysis of PUF-Based Tamper Protection
title_short Information Theoretic Analysis of PUF-Based Tamper Protection
title_sort information theoretic analysis of puf based tamper protection
topic Physical Unclonable Functions
Tamper Protection
Error Correction
Wiretap Channel
Secret Sharing
Physical Layer Security
url https://tches.iacr.org/index.php/TCHES/article/view/12059
work_keys_str_mv AT georgmaringer informationtheoreticanalysisofpufbasedtamperprotection
AT matthiashiller informationtheoreticanalysisofpufbasedtamperprotection