Attacking RO-PUFs with Enhanced Challenge-Response Pairs - ICT Systems Security and Privacy Protection
Conference Papers Year : 2018

Attacking RO-PUFs with Enhanced Challenge-Response Pairs

Nils Wisiol
  • Function : Author
  • PersonId : 1042908
Marian Margraf
  • Function : Author
  • PersonId : 1042909

Abstract

This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all PUF responses after querying the PUF with $$n+2$$n+2 attacker-chosen queries. This result renders the proposed RO-PUF with Enhanced Challenge-Response Pairs inapt for most typical PUF use cases, including but not limited to all cases where an attacker has query access.
Fichier principal
Vignette du fichier
472722_1_En_9_Chapter.pdf (241.68 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-02023734 , version 1 (21-02-2019)

Licence

Identifiers

Cite

Nils Wisiol, Marian Margraf. Attacking RO-PUFs with Enhanced Challenge-Response Pairs. 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.122-126, ⟨10.1007/978-3-319-99828-2_9⟩. ⟨hal-02023734⟩
60 View
44 Download

Altmetric

Share

More