the need for hardware roots of trust
play

The need for hardware roots of trust Ingrid Verbauwhede KU Leuven, - PDF document

Ingrid Verbauwhede 6/21/19 The need for hardware roots of trust Ingrid Verbauwhede KU Leuven, ESAT - COSIC ibenik June 21, 2019 Slides credit: Milo Gruji , Jeroen Delvaux, Kent Chuang, Adriaan Peetermans, Roel Maes and other PhD


  1. Ingrid Verbauwhede 6/21/19 The need for hardware roots of trust Ingrid Verbauwhede KU Leuven, ESAT - COSIC Š ibenik June 21, 2019 Slides credit: Milo š Gruji ć , Jeroen Delvaux, Kent Chuang, Adriaan Peetermans, Roel Maes and other PhD students Outline Ø Implementation Challenges Ø Hardware roots of trust Ø PUFs Ø TRNG Ø Conclusions 2 1 Sibenik, Croatia, June 21, 2019

  2. Ingrid Verbauwhede 6/21/19 Internet of Everything – IOT – Industry4.0 E-… • Internet of things • E-health, e-commerce • E-voting, e-… • Smart grid • Big data [IMEC, HUMAN++] Anything E- or Smart needs security 3 How the crypto protocol paper sees it: Some calculations are on the arrows? 4 Source: J.Hermans, et al., “Proper RFID Privacy: Model and Protocols,” IEEE Trans on Mobile computing, 2014 2 Sibenik, Croatia, June 21, 2019

  3. Ingrid Verbauwhede 6/21/19 Protocol relies on secrets and random numbers 5 Source: J.Hermans, et al., “Proper RFID Privacy: Model and Protocols,” IEEE Trans on Mobile computing, 2014 Root of Trust DESIGN METHODS: DECOMPOSE IN COMPONENTS • Application: secure communication • Algorithms: public key, secret key, relies on secret key, post-quantum Confidentiality Confidentiality Integrity Integrity Integrity Identification Identification Identification • Architecture: Hardware/Software platform, Sancus Cipher Design, Biometrics • Micro-architecture: crypto co- Java Java processors, instruction set extension, JCA JCA JVM KVM • Logic circuits and (secure) memory CPU CPU • TRNGs and PUFs Crypto MEM MEM Vcc Vcc D D Mem Q Q PUF CLK CLK [DATE2007] “A root of trust is a component at a lower abstraction layer, upon which the system relies for its security.” 6 3 Sibenik, Croatia, June 21, 2019

  4. Ingrid Verbauwhede 6/21/19 How to store a secret? Permanently: e.g. for a master key • Fuses: large, visible, limited numbers • Non-volatile memory: extra processing • Battery-backed SRAM, cumbersome, battery can die • PUFs: physically unclonable functions = a cost-efficient replacement technology for secure non-volatile memory (NVM) [PhD Jeroen Delvaux] 7 Silicon PUF: An unique fingerprint of a chip • PUF can be viewed as an unique fingerprint of a chip • Comes from random process variations • Various implementations and applications Key generation “0” “1” “1” “0” Anti-counterfeit 501.1 MHz 498.2 MHz 01011 ... 010 Digital ID IP protection ··· Chip fingerprint Entity authentication “0” “1” “1” “0” 8 4 Sibenik, Croatia, June 21, 2019

  5. Ingrid Verbauwhede 6/21/19 Silicon PUFs - Variability Silicon Biometrics ● Variability in transistors and interconnect ● In general undesired, except for PUFs ● Random dopant fluctuation ● Tox ● Line edge/width roughness ● Crucial design challenge with CMOS down scaling (Moore‘s law) ● Pelgrom‘s law: σ 2 ~ 1/WL (Marcel Pelgrom, Dutch engineer) MOSFET 9 More opportunities brought by scaling • Even more challenging to manufacture identical devices in scaled technologies o Moore’s Law o 40nm à 28nm à 16nm à 7nm à ... • More variability comes from: o More processing steps o Decreased size (e.g. 2nm difference à 5% in 40nm and 30% in 7nm) o New materials Gate Source Source: imec Source: imec Drain More variability Planar Gate all-around FinFET to be expected Transistor design roadmap 10 5 Sibenik, Croatia, June 21, 2019

  6. Ingrid Verbauwhede 6/21/19 The ideal PUF? Chip-dependent binary func8on with 128b 128b noisy output 1CA7 3402 F640 B545 0A13 AF01 A758 3C58 Evalua8on 1 3F5A 5B76 5889 3425 5245 EF32 154B 4467 ≈ 1-15% noise IC 1 1BA7 3402 F642 B545 Evalua8on 2 3F5A 5BA6 5889 3435 128b 128b 34D2 1CF0 3492 1F52 Evalua8on 1 0A13 AF01 A758 3C58 A078 265D 1C03 2604 5245 EF32 154B 4467 IC 2 34D0 1CE0 3492 1F72 Evalua8on 2 ≈ 1-15% noise A078 665D 1C03 260A IDEAL PUF is without noise 11 Two design methodologies Dream 1: IDEAL PUFS don‘t exist.. Strong PUF Weak PUF r 11 r 12 r 13 c 1 r 1 r 21 r 22 r 23 r 31 r 32 r 33 # outcomes # outcomes exponential linear # elements # elements 12 6 Sibenik, Croatia, June 21, 2019

  7. Ingrid Verbauwhede 6/21/19 Weak PUF An array of identically designed circuit elements ● Each producing 1 (or a few) response bit(s) ● High-quality response bits, i.e., high entropy ● Limited number of bits, e.g., a few 1000s ● Weak because of limited response size, but the best in reality ● E.g., SRAM PUF, spot-break-down PUF ● IC Typical application: key generation ● E.g. 128-bit AES 13 SRAM PUF – a classic weak PUF • 2D array of 1-bit memory cells • Variability: mismatch between the cross-coupled inverters • Volatile: data is cleared after power-off I 1 “1” “0” I 2 Two possible outcomes after power-up I 1 “0” “1” I 2 I 2 I 1 6T-SRAM cell Bi-stable states 14 7 Sibenik, Croatia, June 21, 2019

  8. Ingrid Verbauwhede 6/21/19 Transistor variations determines PUF bits • Assume one of the transistors is much weaker than others • Four extreme cases “0” “1” “1” “0” “0” “1” “1” “0” 15 Strong PUF Finite number of physical building blocks combined with mathematical operations ● E.g., sum of delays, currents, voltages etc. ● Can produce a gazillion of response bits (2 128 ) è Strong ● Low-quality bits: highly correlated, low-entropy ● IC E.g., arbiter PUF ● + Typical application: ● IC authentication + >0 + response r = + 01100110 16 8 Sibenik, Croatia, June 21, 2019

  9. Ingrid Verbauwhede 6/21/19 Arbiter PUF – based on timing differences Arbiter ··· 0/1 Response “1” “0” “0” “1” Challenge N-bit challenge 0 à 2 N possible CRPs (Strong PUF) 1 1 [Lee, VLSIC 2004] 0 [Gassend, 2004] 17 Arbiter PUF is not an ideal strong PUF • Linear additive structure: sum of delays • Similar challenges à similar responses Arbiter ··· 0/1 “1” “0” “0” “1” C 1 : Δ t 1,1 + Δ t 2,0 + + Δ t N-1,0 + Δ t N,0 = Δ t 1 Change only “1” “0” “1” “1” C 2 : one bit Not likely to Δ t 1,1 + Δ t 2,0 + + Δ t N-1,1 + Δ t N,0 = Δ t 1 - Δ t N-1,0 + Δ t N-1,1 change sign Addition of N elements >> Difference of one element 18 9 Sibenik, Croatia, June 21, 2019

  10. Ingrid Verbauwhede 6/21/19 Strong PUF problem: responses easily predicted • CRPs are highly correlated: low entropy à Prone to machine learning (ML) attacks Experimental results on 65 nm CMOS: only a few 1000 CRPs are sufficient to model the PUF with high accuracy [Hospodar, WIFS 2012] [Ruhrmair, ACM CCS 2010] 19 Arbiter PUFs: XOR Variant • Arbiter PUF: original MIT work • UNIQUE project result 3% Challenge: 47% 0 1 0 1 1 0 Arbiter 0/1 ≈7% 46% Switch Block Temp./Volt. variation 0 1 0 1 1 0 Arbiter 6% Response: 49% 0/1 Arbiter Arbiter 20 UNIQUE ASIC results 10 Sibenik, Croatia, June 21, 2019

  11. Ingrid Verbauwhede 6/21/19 Arbiter PUF – XOR Variant XOR the response of multiple chains ● More resistant against machine learning ● # CRPs in training set ↑ ● Training time ↑ ● Unfortunately, noise amplification as well ● Example: Becker et al. at CHES 2015 ● 21 [Ruhrmair, IEEE TIFS 2013] Dream or future research? Wish a strong PUF: • Finite number of elements • Gazillion Challenge Response Pairs IC • Non-linear combination to resist modeling attacks: ideally cryptographic functions + • BUT: noise amplification makes output not useful + >0 + Dream: strong PUF from finite number of response r = + 01100110 elements, resistant to modeling, noise tolerant Maybe: computational security? 22 11 Sibenik, Croatia, June 21, 2019

  12. Ingrid Verbauwhede 6/21/19 Weak SRAM PUF: Basics 6T CMOS SRAM Cell <12% 3.8% 6.5% 50% 43.2% 49.3% Holcomb et al. 2009, Holcomb et al. 2007, Guajardo et al. 2007, Commercial SRAM Embedded SRAM FPGA SRAM temp./volt. var. 23 PUF behavior of SRAM in commodity micro-controller Black box approach (off the shelf micro-controllers) Within and between Average bit value (%) • PIC16F1825 class HD (%) • STM32F100R8 Within Class 24 [PhD Anthony VH] 12 Sibenik, Croatia, June 21, 2019

  13. Ingrid Verbauwhede 6/21/19 PUF behavior of SRAM in commodity micro-controller Black box approach (off the shelf micro-controllers) Within and between Average bit value (%) • PIC16F1825 class HD (%) • STM32F100R8 Between Class Needs post-processing to create key! 25 Reliability • PUF responses are not exactly reproducible o At different time o In different environment PUF response r 1 = #1: 10100100101010001... #2: 101 1 0100 0 01010001... #3: 101001 1 0101010001... 26 13 Sibenik, Croatia, June 21, 2019

  14. Ingrid Verbauwhede 6/21/19 Short-term reliability (data stability) • PUF response changed temporarily caused by: o Environment change (external) o Internal fluctuation External: Internal - Temperature - White noise - Supply voltage - Flicker noise - Humidity - Cross-talk - Radiation - Glitch - ... - ... How to improve the short-term reliability? 27 Good reliability is crucial • Error correction codes need to be stored à NVM needed • Why not just store the key in NVM? Key in NVM PUF-based key generator integrated circuit (IC) NVM Extraction Interface Readout (ROM/Flash) Entropy NVM 128-bit Secret key Error Correction n-bit k-bit CRYPTO No clear benefit Make it Need to go! in terms of cost stable 28 14 Sibenik, Croatia, June 21, 2019

Recommend


More recommend