Physically Restricted Authentication with Trusted Hardware Michael Kirkpatrick, Elisa Bertino Department of Computer Science 4th Annual Workshop on Scalable Trusted Computing (STC) Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Introduction New York Miami Chicago Los Angeles Introduction • Full access provided to trusted devices ▫ Fine-grained access control at application layer • Permit mobility of the device • Mitigate insider threats • Minimize computation overhead ▫ Applicable for low-power embedded devices Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions PUFs • Functions ▫ Given challenge C, provides response R ▫ Output is consistent for same input • Unclonable ▫ Cannot be predicted, controlled, or duplicated • Physical ▫ HW instance resolves non-determinism PUFs Counter C Compare Counter C 1/0 R Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Design Requirements • Avoid chain-of-trust assumptions ▫ No PKI • Zero-knowledge proof is critical ▫ PUF behavior must be protected ▫ Adaptation of Feige-Fiat-Shamir • Intractability of modular square roots Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Protocols • Installation & Commitment ▫ Secret sharing for symmetric key K ▫ Each administrator gets one Ci ▫ Xi = Ri bi GCD(Xi,N) = 1 Protocols • Authentication ▫ C picks a random r ▫ I* indicates a random set of Ci ▫ Accept if y2 = +/- r2 X12 ... Xk2 Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Future Work • Implementing PUFs ▫ Trade-offs of size, performance, randomness ▫ What vulnerabilities exist? • Designing new protocols ▫ PUF-based signatures ▫ Zero-knowledge proofs without intractability assumptions • Additional applications Agenda • • • • • • Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions Conclusions • PUFs can enforce physical access control restrictions ▫ Can be used where TPMs cannot • Protection of PUF behavior is vital • PUF-specific protocols and applications can help the technology grow
© Copyright 2026 Paperzz