An attack on PUF-based session key exchange and a hardware-based countermeasure: Erasable PUFs

23Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We observe a security issue in protocols for session key exchange that are based on Strong Physical Unclonable Functions (PUFs). The problem is illustrated by cryptanalyzing a recent scheme of Tuyls and Skoric [1], which has been proposed for use in a bank card scenario. Under realistic assumptions, for example that the adversary Eve can eavesdrop the communication between the players and gains physical access to the PUF twice, she can derive previous session keys in this scheme. The observed problem seems to require the introduction of a new PUF variant, so-called "Erasable PUFs". Having defined this new primitive, we execute some first steps towards its practical implementation, and argue that Erasable PUFs could be implemented securely via ALILE-based crossbar structures. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Rührmair, U., Jaeger, C., & Algasinger, M. (2012). An attack on PUF-based session key exchange and a hardware-based countermeasure: Erasable PUFs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7035 LNCS, pp. 190–204). https://doi.org/10.1007/978-3-642-27576-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free