Final Report on Prototype Testing
|
|
|
- Tobias Mathews
- 10 years ago
- Views:
Transcription
1 .. D1.2: Final Report on Prototype Testing Project number: Project acronym: CODES Project title: Algorithmic extraction and error-correction codes for lightweight security anchors with reconfigurable PUFs Start date of the project: Duration:. 24 months Deliverable type: Report Deliverable reference number: / D1.2 Deliverable title: Final Report on Prototype Testing WP contributing to deliverable: WP01 Due date: Actual submission date: Responsible organisation: TEC Authors: Ingrid Schaumüller-Bichl, Andrea Kolberger, Martin Deutschmann, Michael Höberl, Christina Petschnigg, Clemens Heuberger, Michela Mazzoli, Winfried Müller, Benjamin Hackl Abstract: This report covers a description of the performed functional tests of the demonstrators and a summary of the achieved results. It includes testing of the implemented Error Correcting Codes (ECC) as well as a set of evaluation scenarios for the two demonstrators. Parts of the evaluations are depicted as screen-shots in the appendix of the document. Keywords: Physically Unclonable Function, Prototype,. Testing, ECC Dissemination level: PU Revision:. 1.0
2 . Contents 1 Introduction Purpose Scope Outline Testing of Error-Correcting Codes Reed-Muller and Repetition Code Testing of Demonstrator I: Mutual Authentication Mutual Authentication Replay Attack Fault Detection Extended Test Case Testing of Demonstrator II: Key Generation Enrolment and Reconstruction Binding String to PUF Extended Test Case Conclusion 20 References 21 A Testing of Demonstartor I: Mutual Authentication 22 A.1 MA-TC1: Enrolment of PUF A.2 MA-TC2: Mutual Authentication of PUF A.3 MA-TC3: Mutual Authentication of PUF 2 using CRPs enrolled for PUF A.4 RA-TC1: Successful Mutual Authentication of PUF 1 using Challenge # A.5 RA-TC2: Detection of Replay Attack A.6 FD-TC1: Successful Mutual Authentication of PUF 1 using any CRP A.7 FD-TC2: Manipulation of transmitted hash values a and b B Testing of Demonstartor II: Key Generation 29 B.1 ER-TC1: Successful Enrolment of PUF B.2 ER-TC2: Key Reconstruction of PUF B.3 BS-TC1: Key Reconstruction using PUF B.4 BS-TC2: Key Reconstruction using PUF
3 List of Abbreviations ASIC BCH CRP FE Application Specific Integrated Circuit Bose-Chaudhuri-Hocquenghem (error-correcting codes) Challenge Response Pair Fuzzy Extractor FPGA Field-Programmable Gate Array HD MAC PUF RM RS Helper Data Message Authentication Code Physically Unclonable Function Reed-Muller (error-correcting codes) Reed-Solomon (error-correcting codes) SRAM Static Random Access Memory 3/32
4 List of Figures 1 Sequence diagram of Demonstrator I applying MACs to ensure integrity and authenticity of transmitted data Screenshot of MA-TC Screenshot of MA-TC Screenshot of MA-TC Screenshot of RA-TC Screenshot of RA-TC Screenshot of FD-TC Screenshot of FD-TC Screenshot of ER-TC Screenshot of ER-TC LCD Display after ER-TC2 was successfully executed Screenshot of BS-TC LCD Display after BS-TC1 was successfully executed Screenshot of BS-TC /32
5 1 Introduction 1.1 Purpose During the first phase of WP1, weak spots regarding security, complexity and reliability of PUF security modules have been analysed. The outcome was the SWOT Analysis, delivered in D1.1 - SWOT Analysis of existing PUF security modules [1]. The second phase of this work package has focused on the system testing of the developed demonstrators from WP3 [4]. The aim of the system tests is on the one hand to verify that the system behaves as previously defined and on the other hand to ensure that the system reacts on faults as foreseen. 1.2 Scope The scope of this document is limited to the various test scenarios that were carried out on the two demonstrators. Thus, the setup, architecture, components and implementation are covered within deliverable D3.1 - Hybrid FPGA ASIC Prototype [4]. For each demonstrator test cases have been defined and carried out. Furthermore, for the implemented error-correcting codes dedicated test scenarios were carried out. 1.3 Outline The structure of this document is as follows: Section 2 deals with the testing of the implemented error-correcting codes. Since the ECCs are a core component of the demonstrators, it is necessary to ensure that they are capable of correcting the noisy PUF responses. Section 3 is split into four parts. The first three parts cover different test scenarios on the Demonstrator I: Mutual Authentication that have been performed. The fourth part gives an overview of further test scenarios. Testing of Demonstrator II: Key Generation is carried out within Section 4. This section is split up into three parts. The first two parts are covering the two test scenarios that have been carried out. The third part gives an overview of further test scenarios. The deliverable comes to its end with the conclusion in Section 5. 5/32
6 2 Testing of Error-Correcting Codes In WP2 AAU Klagenfurt performed a statistical analysis on the measurements of different types of PUF-based devices previously observed in the UNIQUE-Project [7]. More precisely, our analysis involved SRAM, Arbiter and Ring Oscillator PUFs. Results of the statistical analysis have already been presented in Deliverable D2.1 [3]. We have carried out the same basic analysis for all the three aforementioned PUFs and their respective challenge-response algorithms. In particular, we have investigated the following important parameters: error-per-bit rate error-per-response rate independence of bit errors ageing effects on SRAM devices. For the SRAM PUF, more experimental data were available, therefore we were able to carry out a more extensive investigation that allowed us to develop a statistical model of such a PUF. Investigation of bit weights of given measurements shows that, for example, a Beta distribution with hyperparameters α = β = is suitable to model the SRAM PUF bit weights. By using Bayesian approaches, we also proposed a more sophisticated statistical model for the noise of such a SRAM PUF (which only concerns the number of erroneous bits per response): we assumed the error rates per bit follow a scaled Beta distribution with shape parameters 2δ K and (1 2δ) K (where δ resembles the expected value of the Beta distribution and K again is a shape parameter). In a Bayesian setting, such parameters often are assumed to be random variables themselves; in our case we proposed a scaled Beta distribution for the mean δ and a Gamma distribution for the shape parameter K. Currently, we are still working on a rigorous discussion of this model. Furthermore, we have implemented a Sage [8] script that simulates the SRAM PUF behaviour. More specifically, our SRAM simulator can be initialised with user-defined Beta-distribution parameters, and then it can generate SRAM-like bit error patterns; these binary strings represent the XOR difference between two PUF responses produced by one the the same PUF device when queried with the same challenge (where, as usual, 1 represents an erroneous bit, whilst 0 stands for a correct bit). Selected error-correcting codes have been tested in two ways: 1. against the SRAM PUF statistical model described above, i.e. the number and position of bit errors are controlled by the SRAM PUF simulator; 2. against uniform error patterns of given weight, i.e. the number of bit errors is given as an input and the error positions are randomly distributed. The former test is necessary to make sure that our ECCs perform as desired, i.e. as predicted by our theoretical investigation (cf. [3]), on a realistic simulation of the SRAM PUF device. The latter test, instead, is independent from the ECCs concrete application; it is meant to find out how many errors the ECCs can actually correct on a binary symmetric channel, and how the decoding failure rate gets worse by increasing the number of bit errors. We have tested the concatenated code BCH[31,6,15] + RS[63,32,32], which has been implemented in Demonstrator I: Mutual Authentication. We recall that the resulting concatenated code is a linear binary code of length = 1953, dimension 6 32 = 192 and minimum distance at least = 480, thus covering radius at least = 239. We use as decoding algorithms the Berlekamp-Massey decoder for BCH, and the Gao decoder for Reed-Solomon. Furthermore, inner 6/32
7 and outer code interact in hard-decision mode, which means that the inner code (BCH) always attempts minimum-distance decoding, even when too many errors have been detected (but not located); thus no erased symbol is passed to the outer code. Test 1 takes place as follows: 1. generate 50 uniform bitstrings of length 192 (message m); 2. encode each bitstring (obtaining a codeword c of length 1953 bits); 3. apply 50 bit-error patterns e provided by the SRAM PUF simulator: w = c e; 4. decode w and retrieve the original message m ; 5. if m = m then decoding has been successful. The error-correcting code BCH+RS has successfully passed this test. Test 2 takes place as follows: 1. generate 10 uniform bitstrings of length 192 (message m); 2. encode each bitstring (obtaining a codeword c of length 1953 bits); 3. apply 100 pseudorandom bit-error patterns e of given weight: w = c e; 4. decode w and retrieve the original message m ; 5. if m = m then decoding has been successful. We have observed the following outcome in the BCH+RS error-correction simulation. error weight failure rate < % < 1% % 5% % 10% % 25% % 45% > 480 > 50% We emphasise that, due to the random nature of generated messages and error vectors, by repeating the very same test, one might obtain slightly different failure rates, although the overall trend shall remain the same. It is worth noting that the ratio between the number of erroneous bits that can be corrected out of the total number of bits is equivalent to the fact that about 21% of the PUF response has been corrupted, which is much worse than the actual PUF behaviour that we have observed in the SRAM device. In fact, given the code length of 1953 bits, the SRAM PUF simulator generates bit error patterns of weight between 90 and 125 bits, which means that only between 4.6% and 6.4% bits in the PUF response are erroneous. This higher error-correction capacity can serve as an effective anti-ageing feature. 2.1 Reed-Muller and Repetition Code In addition to the concatenation of BCH and Reed-Solomon code, the error correction capacity of the concatenated Reed-Muller and Repetition code was evaluated. This code has been implemented in Demonstrator II: Key Generation. Similarly to the concatenation in the previous section, the resulting RM(16,5,8)+Rep(5,1,5) code is a linear binary code of length n = 16 5 = 80. 7/32
8 Its dimension is k = 5 1 = 5 and the minimum Hamming distance is at least d = 8 5 = 40. Thus we can conclude that the covering radius is at least t = = 19. The decoding of the Reed-Muller code is performed using Reed s majority logic decoder, which interacts in a harddecision mode with the Repetition decoder. This means that the decoder of the inner code, which is the Repetition code, does not pass any erased symbols to the decoder of the outer code, i.e. the Reed-Muller code. From now on, the parameter P total, which indicates the probability that a given bit sequence is not decoded correctly, is calculated for the above mentioned concatenation. To derive P total we make use of the simpler, homogeneous model described in [6], where the errors in a PUF response are assumed to be uniformly distributed. This model can be used to calculate upper bounds for the real value of P total. In addition, we assume a bit error probability P bit of 8%, which is about the bit error probability of UNIQUE chips at room temperature. We use the following formulas for the calculation of P total [6]: P in = P total = n in i=t out+1 ( nin i i=t in+1 n out ( nout i ) P i bit (1 P bit ) nin i, ) P i in (1 P in ) nout i, where P in represents the probability that the inner code fails, n in and n out represent the length of the inner and the outer code respectively, t in and t out stand for the covering radius of the inner and the outer code respectively. For our parameter P bit, the failure probability of the concatenation equals P total 7.31e 007. In addition, it should be noted that the ratio between the number of errors that can be corrected and the length of the concatenation is t/n = = which is about 23.75% of the code length. This theoretical assumption has been evaluated with the following test scenario: 1. generate a random bitstring of length 5 (m) 2. encode the bitstring (obtaining a codeword of length 80) 3. apply 1000 pseudorandom bit-error patterns to obtain an error-per-response rate ρ 4. decode the erroneous codeword (m ) 5. if m = m then decoding has been successful The following results have been observed with this test methodology: ρ failure rate < 25% 0 % 25% 30% < 1% 30% 35% 1% 5.5% 35% 40% 5.5% 12.1% 40% 45% 12.1% 23.4% 45% 50% 23.4% 34.2% > 50% > 50% Since pseudorandom error patterns are used to modify the codeword, it might be possible to obtain slightly different results by repeating this test. However, the trend should be the same. 8/32
9 3 Testing of Demonstrator I: Mutual Authentication 3.1 Mutual Authentication Description of the test scenario. The objective of this test case is to check whether the FPGA board is capable to authenticate the GUI/verifier and vice versa. In the first step the enrolment will take place, i.e. the FPGA board will be initialized and a set of CRPs will be created. After enrolment, both entities should be capable to verify the authenticity of each other. Moreover, this test scenario checks whether another PUF instantiation (e.g. PUF 2) can be authenticated using a CRP enrolled for PUF 1. Test ID MutualAuthentication (MA) Tester Date August 24 th, 2014 Test status passed Michael Höberl Test Case ID MA-TC1: Enrolment of PUF 1 Dependencies, Pre-Conditions no CRPs are available for PUF 1 Test Data, Input, Single Test Steps 1. Select PUF: PUF 1 2. Select Scenario: Mutual Authentication 3. Press Button: Enrolment Expected Test Results Actual Test Results Notes Message Monitor: Enrolment of PUF 1 successful: 10 CRPs have been created! The enrolment finished successfully and a database with 10 CRPs was created. A detailed description of the test can be found in Appendix A.1. Enrolment has to be successfully executed in order to start with Test Case MA-TC2 Test Case ID MA-TC2: Mutual Authentication of PUF 1 Dependencies, Pre-Conditions successful execution of MA-TC1 1. Select PUF: PUF 1 2. Select CRP: #6 Test Data, Input, Single Test Steps 3. Select Scenario: Mutual Authentication 4. Press Button: Start Scenario 5. Press Button: Next Step 6. Press Button: Next Step 9/32
10 Expected Test Results after Step 5: Message Monitor: PUF 1 was successfully authenticated, hash a from FPGA and calculated hash a of GUI are equal, form field FPGA authenticated is edged in green after Step 6: Message Monitor: GUI was successfully authenticated, hash b from GUI and calculated hash b of FPGA are equal, form field GUI authenticated is edged in green Actual Test Results Notes Test Case ID Dependencies, Pre-Conditions The GUI/verifier was able to verify its authenticity to the FPGA board and vice versa. A detailed description of the test can be found in Appendix A.2. Mutual Authentication of PUF 1 has to be successful in order to show in MA-TC3 that an unenrolled PUF cannot be authenticated MA-TC3: Mutual Authentication of PUF 2 using CRPs enrolled for PUF 1 successful execution of MA-TC1 + MA-TC2 1. Select PUF: PUF 2 2. Select CRP: #4 from PUF 1!!!! Test Data, Input, Single Test Steps 3. Select Scenario: Mutual Authentication 4. Press Button: Start Scenario 5. Press Button: Next Step 6. Press Button: Next Step Expected Test Results after Step 5: Message Monitor: Authentication of PUF 2 failed, hash a from FPGA and calculated hash a of GUI are not equal, form field FPGA authenticated is edged in red after Step 6: Message Monitor: GUI is not authenticated, hash b from GUI and calculated hash b of FPGA are not equal, form field GUI authenticated is edged in red Actual Test Results The authentication failed. A detailed description of the test can be found in Appendix A.3. Notes - 10/32
11 3.2 Replay Attack Description of the test scenario. The objective of this test case is to check whether a replay attack on the FPGA board is detected or not. In doing so our demonstrator provides the possibility to send the same challenge several times to the FPGA board. Test ID ReplayAttack (RA) Tester Michael Höberl Date August 21 st, 2014 Test status passed Test Case ID Dependencies, Pre-Conditions RA-TC1: Successful Mutual Authentication of PUF 1 using Challenge #8 PUF 1 has to be enrolled with at least 8 CRPs 1. Select PUF: PUF 1 2. Select CRP: #8 Test Data, Input, Single Test Steps 3. Select Scenario: Mutual Authentication 4. Press Button: Start Scenario 5. Press Button: Next Step 6. Press Button: Next Step Expected Test Results after Step 5: Message Monitor: PUF 1 was successfully authenticated, hash a from FPGA and calculated hash a of GUI are equal, form field FPGA authenticated is edged in green after Step 6: Message Monitor: GUI was successfully authenticated, Hash b from GUI and calculated hash b of FPGA are equal, form field GUI authenticated is edged in green Mutual Authentication of PUF 1 using Challenge #8 succeeded. Actual Test Results Notes Test Case ID Dependencies, Pre-Conditions The GUI/verifier was able to verify its authenticity to the FPGA board and vice versa. A detailed description of the test can be found in Appendix A.4. Test Case RA-TC2 can only be executed and replay can only be detected when test case RA-TC1 succeeded. RA-TC2: Detection of Replay Attack Test case RA-TC1 has to be executed successfully 11/32
12 1. Select PUF: PUF 1 Test Data, Input, Single Test Steps 2. Select CRP: #8 3. Select Scenario: Replay Attack 4. Press Button: Start Scenario Expected Test Results Actual Test Results The Message Monitor displays REPLAY DETECTED!!! and the protocol terminates. The replay attack was successfully detected and the protocol terminated. A detailed description of the test can be found in Appendix A.5. Notes - 12/32
13 3.3 Fault Detection Description of the test scenario. The objective of this test case is to check the behaviour of the prototype when data required for authentication issues, i.e. transmitted hash values (a and b), are manipulated. Test ID FaultDetection (FD) Tester Michael Höberl Date August 21 st, 2014 Test status passed Test Case ID FD-TC1: any CRP Successful Mutual Authentication of PUF 1 using Dependencies, Pre-Conditions PUF 1 has to be enrolled 1. Select PUF: PUF 1 2. Select any CRP Test Data, Input, Single Test Steps 3. Select Scenario: Mutual Authentication 4. Press Button: Start Scenario 5. Press Button: Next Step 6. Press Button: Next Step Expected Test Results after Step 5: Message Monitor: PUF 1 was successfully authenticated, hash a from FPGA and calculated hash a of GUI are equal, form field FPGA authenticated is edged in green after Step 6: Message Monitor: GUI was successfully authenticated, hash b from GUI and calculated hash b of FPGA are equal, form field GUI authenticated is edged in green Mutual Authentication of PUF 1 succeeded. Actual Test Results Notes Test Case ID Dependencies, Pre-Conditions The GUI/verifier was able to verify its authenticity to the FPGA board and vice versa. A detailed description of the test can be found in Appendix A.6. This test case should be carried out before FD-TC2 in order to show that the regular authentication mechanism works. FD-TC2: Manipulation of transmitted hash values a and b PUF 1 has to be enrolled and test case FD-TC1 executed successfully; do not use the same CRP as applied in FD-TC1 13/32
14 1. Select PUF: PUF 1 2. Select any CRP (except the one used in FD-TC1) Test Data, Input, Single Test Steps 3. Select Scenario: System Fault 4. Press Button: Start Scenario 5. Press Button: Next Step 6. Press Button: Next Step Expected Test Results after Step 5: Message Monitor: Authentication of PUF 1 failed, hash a from FPGA and calculated hash a of GUI are not equal, form field FPGA authenticated is edged in red REJECT, i.e. the FPGA could not be authenticated by the GUI after Step 6: Message Monitor: GUI is not authenticated, hash b from GUI and calculated hash b of FPGA are not equal, form field GUI authenticated is edged in red REJECT, i.e. the GUI could not be authenticated by the FPGA Actual Test Results Notes A detailed description of the test can be found in Appendix A.7. An error vector is added to the hash values a and b to simulate a fault attack. This error vector is generated randomly. 3.4 Extended Test Case The results of the above mentioned test cases show the correct and reliable functionality of the implemented prototype as well as the error-correction algorithms. Thus the demonstrator provides the capability to authenticate both entities FPGA board and PC/GUI. Additionally, Sections 3.2 and 3.3 demonstrate how replay attacks and faults can be detected. In this way the main functionality of the CODES prototype, that is the correct and reliable reconstruction of error-prone PUF responses, is approved. Of course, in a real world IT product using PUF technology, further test scenarios have to be carried out; however, these do not provide added value for the prototype implementation. This section provides some information and suggestions for supplemental testing activities. Manipulation of Helper Data. The protocol of the Mutual Authentication use case requires the FPGA board to extract helper data, which are sent to the PC/GUI, in order to reconstruct the PUF response. In the case that helper data generated by the FPGA board and sent to the PC/GUI are manipulated, the PC/GUI might calculate an erroneous hash value a and authentication of the FPGA would fail. Thus the manipulation of helper data should also be considered in a separate test scenario. Integrity and Authenticity Check. A real world product can implement a security functionality that provides an integrity and authenticity check of data transmitted between the PUF-based device and the verifier. This can be realized by applying Message Authentication Codes (MACs), 14/32
15 possibly using the PUF response as the key or any other secret that has been previously agreed upon. In doing so the integrity and authenticity of transmitted hash values, helper data, or even state information in case of reconfigurable PUFs, can be ensured. Figure 1 gives an idea of how this can be implemented in the communication protocol. Database [ID,C,R ] GUI / Verifier FPGA Board ASIC Board request(a,hd);send(c) request(r) generate(r) generate(hd) send(r) a hash(id,r,hd) m = MAC(a,R) send(a,hd,m) R reconstruct(r,hd) m MAC(a,R) IntAuthCheck(m =m) Figure 1: Sequence diagram of Demonstrator I applying MACs to ensure integrity and authenticity of transmitted data. Testing all available PUF instantiations. The test cases in Sections 3.1, 3.2 and 3.3 show the results using PUF 1 and 2 located on the ASIC board. For the sake of completeness, all possible tests considering different combinations of PUFs and CRPs should be performed, d.h. PUF 5 is enrolled and PUF 4 is authenticated, all challenges of PUF 3 are applied to test replay attacks, or all PUFs are subject to fault detection. Some different combinations were tested on the prototype implementation and each of them returned the same expected results. As recording all the test results in this deliverable is without added value and would just unnecessarily blow up the document only one exemplary test case is provided for each test scenario. 15/32
16 4 Testing of Demonstrator II: Key Generation 4.1 Enrolment and Reconstruction Description of the test scenario. The objective of this test case is to check whether a PUF instantiation can be enrolled successfully and the reconstruction of the key works. The user sends a string to the FPGA board, which generates a secret key based on the PUF response, encrypts the string and stores it in non-volatile memory. In the reconstruction phase the FPGA board reconstructs the key, decrypts the string, returns it to the GUI and shows the string on the LCD display. Test ID Enrolment and Reconstruction (ER) Tester Date August 20 th, 2014 Test status passed Michael Höberl Test Case ID ER-TC1: Successful Enrolment of PUF 3 Dependencies, Pre-Conditions none 1. Select PUF: PUF 3 Test Data, Input, Single Test Steps 2. Select Scenario: Enrolment 3. Enter Initialization Text: DemoII 4. Press Button: Start Scenario Expected Test Results Actual Test Results Notes After step 4 the PUF is enrolled and the string is encrypted and stored on the FPGA board. The form field Enrolment indicates that enrolment has been performed by showing the string DONE. The message window returns the string Enrolment successful!. The enrolment finished successfully. A detailed description of the test can be found in Appendix B.1. This test case has to be carried out before key reconstruction ER-TC2 is started. Test Case ID ER-TC2: Key Reconstruction of PUF 3 Dependencies, Pre-Conditions PUF 3 has to be enrolled and test case ER-TC1 executed successfully Test Data, Input, Single Test Steps 1. Select PUF: PUF 3 2. Select Scenario: Key Reconstruction 3. Press Button: Start Scenario 16/32
17 Form field Return value of SW displays the string entered in the enrolment test case ER-TC1 DemoII. The values of the following form fields are equal: K generated by FPGA (Enrolment) == Key generated by FPGA (Key Reconstruction) Expected Test Results R generated by ASIC (Enrolment) == R reconstructed by FPGA (Key Reconstruction) Code Word generated by FPGA (Enrolment) == Code Word generated by FPGA (Key Reconstruction) The form field Key Reconstruction indicates that key reconstruction has been performed by showing the string DONE. The message window returns the string Reconstruction successful!. Actual Test Results Notes The key reconstruction and decryption finished successfully. A detailed description of the test can be found in Appendix B.2. PUF 3 is successfully enrolled and the generated key can be reconstructed. 4.2 Binding String to PUF Description of the test scenario. The objective of this test case is to check whether any PUF instantiation is capable to reconstruct a key and consequently decrypt the stored string, which was enrolled with another PUF instantiation. Note: This test scenario shows that using PUFs software can be bound to a certain piece of hardware (HW/SW Binding) as only the PUF used during enrolment is capable to reconstruct the according key in order to decrypt the string/software. Test ID Binding String to PUF (BS) Tester Michael Höberl Date August 22 nd, 2014 Test status passed Test Case ID BS-TC1: Key Reconstruction using PUF 2 Dependencies, Pre-Conditions Test cases ER-TC1 and ER-TC2 must be successfully executed, d.h. PUF 3 is enrolled and the key can be reconstructed. Test Data, Input, Single Test Steps 1. Select PUF: PUF 2 2. Select Scenario: Key Reconstruction 3. Press Button: Start Scenario 17/32
18 The protocol is executed successfully, but the string returned to the GUI and LCD display respectively, is garbled and shows random values instead of the enrolled string DemoII. The values of the following form fields must not be equal: K generated by FPGA (Enrolment)!= Key generated by FPGA (Key Reconstruction) Expected Test Results R generated by ASIC (Enrolment)!= R reconstructed by FPGA (Key Reconstruction) Code Word generated by FPGA (Enrolment)!= Code Word generated by FPGA (Key Reconstruction) The form field Key Reconstruction indicates that key reconstruction has been performed by showing the string DONE but the returned content of the decrypted string is of no value. The message window returns the string Reconstruction successful! as the protocol executed successfully. Actual Test Results The key reconstruction finished successfully, but the decryption failed due to the wrong key. A detailed description of the test can be found in Appendix B.3. Notes - Test Case ID BS-TC2: Key Reconstruction using PUF 3 Dependencies, Pre-Conditions Test cases ER-TC1 and ER-TC2 must be successfully executed, d.h. PUF 3 is enrolled and the key can be reconstructed. Test Data, Input, Single Test Steps 1. Select PUF: PUF 3 2. Select Scenario: Key Reconstruction 3. Press Button: Start Scenario Expected Test Results Actual Test Results Notes Key reconstruction succeeded and string DemoII was correctly decrypted see results of test case ER-TC2 The key reconstruction and decryption finished successfully. A detailed description of the test can be found in Appendix B.4. Test cases BS-TC1 and BS-TC2 show that only the PUF instantiation which was used during enrolment can reconstruct the according key and decrypt the stored string, which means the string is bound to PUF 3. Test case BS-TC1 can be repeated with any other PUF instantiation located on the ASIC board, d.h. PUF 1, PUF 4 and PUF 5; the results will always be the same as for PUF 2: the protocol executes but the returned content has no value. 18/32
19 4.3 Extended Test Case Compared to Use Case Mutual Authentication, the main protocol of this application is performed on the FPGA board. Therefore data stored on it have to be protected and monitored in order to ensure the reliable and correct functionality. The above mentioned test cases show the reliable and correct enrolment and reconstruction of a PUF-based key, as well as the unsuccessful reconstruction due to the hardware-software binding effect. Additionally, the following paragraphs provide information regarding extended test cases that can be performed for real world products using PUF technology. Manipulation of stored data. Use Case Key Generation requires the storage of helper data, generated during enrolment, in non-volatile memory. Assuming that an attacker is capable to manipulate the stored helper data, the PUF-based device might not be able to reconstruct the corresponding key and decryption of the stored string would fail. Thus the device should provide a functionality to periodically check the integrity and authenticity of use case relevant data, such as helper data and the stored string. This can be achieved by applying a Message Authentication Code (MACs) to the helper data and to the stored string, possibly using the PUF response or any other predefined secret as the key. Consequently, the PUF-based device can detect an unauthorized manipulation and trigger a security alarm. MACs can also be applied to state information in case of reconfigurable PUFs. Thus unauthorized key reconfiguration or key zeroization can be detected and an alarm can be triggered. Testing all available PUF instantiations. The test cases in Sections 4.1 and 4.2 show the results using PUF 2 and 3. For the sake of completeness, all possible tests considering different combinations of PUF instantiations should be performed, d.h. PUF 5 is enrolled and PUF 1 is used to reconstruct the key, or the other way round, PUF 1 is enrolled and PUF 5 is used to reconstruct the secret. Some different combinations were tested on the prototype implementation and each of them returned the same expected results. As recording all the test results within this deliverable is without added value and would just unnecessarily blow up the document only one exemplary test case is provided for each test scenario. 19/32
20 5 Conclusion Generating this deliverable worked very well, as valuable preparatory work has been carried out before. First of all the demonstrator was set up as defined and the functionality was exactly as expected. Further the tests to be carried out were defined before and the test descriptions were based on general Common Criteria testing. This allowed a deployment of the tests according to a well defined scheme, which proved to be a good approach. In the course of the implementation of the pre-defined tests, a few potential alternative test cases came to our mind. We decided therefore to integrate those thoughts in additional extended test cases. To not break the build-up of the single test descriptions, we included some additional relevant information about the outcome and single steps of the tests in an appendix. 20/32
21 References [1] I. Schaumüller-Bichl, A. Kolberger, M. Deutschmann, C. Heuberger, W. Müller, B. Hackl, D1.1: SWOT analysis of existing PUF security modules, CODES Project, July [2] I. Schaumüller-Bichl, A. Kolberger, M. Deutschmann, D4.1: Risk analysis, definition of security objectives and security requirements, CODES Project, September [3] B. Hackl, C. Heuberger, M. Mazzoli, W. Müller, V. Brunner, M. Deutschmann, M. Höberl, D2.1: Report on suitable post-processing methods, CODES Project, March [4] M. Deutschmann, M. Höberl, C. Petschnigg, I. Schaumüller-Bichl, A. Kolberger, M. Mazzoli, C. Heuberger, D3.1: Hybrid FPGA ASIC prototype, CODES Project, July [5] I. Schaumüller-Bichl, A. Kolberger, M. Deutschmann, M. Höberl, C. Petschnigg, D4.2: Evaluation of developed functions with respect to criteria defined in D4.1, CODES Project, July [6] C. Bösch, J. Guajardo, A. R. Sadeghi, J. Shokrollahi, P. Tuyls, Efficient Helper Data Key Extractor on FPGAs [7] UNIQUE Foundations for Forgery-Resistant Security Hardware, 09/ /2012; FP7 research project funded by the European Commission and coordinated by Technikon Forschungs- und Planungsesellschaft, [8] W. A. Stein and others, The Sage Development Team, Sage Mathematics Software v6.2, 2014, 21/32
22 A Testing of Demonstartor I: Mutual Authentication A.1 MA-TC1: Enrolment of PUF1 This test consists of three steps (Figure 2): 1. Selecting PUF 1 2. Selecting Mutual Authentication as a scenario 3. Pressing the Enrolment button Figure 2: Screenshot of MA-TC1 22/32
23 A.2 MA-TC2: Mutual Authentication of PUF1 This test consists of six steps (Figure 3): 1. Selecting PUF 1 2. Selecting an unused CRP 3. Selecting Mutual Authentication as a scenario 4. Pressing the Start Scenario button 5. Pressing the Next Step button 6. Pressing again the Next Step button Figure 3: Screenshot of MA-TC2 23/32
24 A.3 MA-TC3: Mutual Authentication of PUF 2 using CRPs enrolled for PUF 1 This test consists of six steps (Figure 4): 1. Selecting PUF 2 2. Selecting an unused CRP 3. Selecting Mutual Authentication as a scenario 4. Pressing the Start Scenario button 5. Pressing the Next Step button 6. Pressing again the Next Step button Figure 4: Screenshot of MA-TC3 24/32
25 A.4 RA-TC1: Successful Mutual Authentication of PUF 1 using Challenge # 8 This test consists of six steps (Figure 5): 1. Selecting PUF 1 2. Selecting CRP # 8 3. Selecting Mutual Authentication as a scenario 4. Pressing the Start Scenario button 5. Pressing the Next Step button 6. Pressing again the Next Step button Figure 5: Screenshot of RA-TC1 25/32
26 A.5 RA-TC2: Detection of Replay Attack This test consists of four steps (Figure 6): 1. Selecting PUF 1 2. Selecting CRP # 8 3. Selecting Replay Attack as a scenario 4. Pressing the Start Scenario button Figure 6: Screenshot of RA-TC2 26/32
27 A.6 FD-TC1: Successful Mutual Authentication of PUF 1 using any CRP This test consists of six steps (Figure 7): 1. Selecting PUF 1 2. Selecting an unused CRP 3. Selecting Mutual Authentication as a scenario 4. Pressing the Start Scenario button 5. Pressing the Next Step button 6. Pressing again the Next Step button Figure 7: Screenshot of FD-TC1 27/32
28 A.7 FD-TC2: Manipulation of transmitted hash values a and b This test consists of six steps (Figure 8): 1. Selecting PUF 1 2. Selecting an unused 3. Selecting System Fault as a scenario 4. Pressing the Start Scenario button 5. Pressing the Next Step button 6. Pressing again the Next Step button Figure 8: Screenshot of FD-TC2 28/32
29 B Testing of Demonstartor II: Key Generation B.1 ER-TC1: Successful Enrolment of PUF 3 This test consists of four steps (Figure 9): 1. Selecting PUF 3 2. Selecting Enrolment as a scenario 3. Enter an initialization text 4. Pressing the Start Scenario button Figure 9: Screenshot of ER-TC1 29/32
30 B.2 ER-TC2: Key Reconstruction of PUF 3 This test consists of three steps (Figure 10): 1. Selecting PUF 3 2. Selecting Key Reconstruction as a scenario 3. Pressing the Start Scenario button Figure 10: Screenshot of ER-TC2 Figure 11: LCD Display after ER-TC2 was successfully executed 30/32
31 B.3 BS-TC1: Key Reconstruction using PUF 2 This test consists of three steps (Figure 12): 1. Selecting PUF 2 2. Selecting Key Reconstruction as a scenario 3. Pressing the Start Scenario button Figure 12: Screenshot of BS-TC1 Figure 13: LCD Display after BS-TC1 was successfully executed 31/32
32 B.4 BS-TC2: Key Reconstruction using PUF 3 This test consists of three steps (Figure 14): 1. Selecting PUF 3 2. Selecting Key Reconstruction as a scenario 3. Pressing the Start Scenario button Figure 14: Screenshot of BS-TC2 32/32
Quality Limitations on the Extraction of a PUF-based Cryptographic Key
Quality Limitations on the Extraction of a PUF-based Cryptographic Key Sandra L. Lattacher, TECHNIKON Forschungs- und Planungsgesellschaft mbh Joint work with Martin Deutschmann, Michael Höberl, Christina
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raïhi 1, Richard Sowell 1, Srinivas Devadas 2 1 Verayo, Inc., San Jose, CA, USA 2 MIT, Cambridge,
Logically Reconfigurable PUFs: Memory-Based Secure Key Storage
Logically Reconfigurable PUFs: Memory-Based Secure Key Storage Ilze Eichhorn Intrinsic-ID High Tech Campus 9 Eindhoven, The Netherlands ilze.eichhorn@ intrinsic-id.com Patrick Koeberl Intel Ireland Collinstown
Offline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech [email protected] Patrick Schaumont Virginia Tech [email protected] Abstract Many Field-Programmable Gate Array (FPGA) based
Anti-Counterfeiting with Hardware Intrinsic Security
Anti-Counterfeiting with Hardware Intrinsic Security Vincent van der Leest and Pim Tuyls Intrinsic-ID, Eindhoven, The Netherlands http://www.intrinsic-id.com Abstract Counterfeiting of goods and electronic
Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes 04/11/2013
Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner and Georg Sigl Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes International
What Types of ECC Should Be Used on Flash Memory?
What Types of ECC Should Be Used on Flash Memory? Application 1. Abstract NOR Flash normally does not need ECC (Error-Correcting Code). On the other hand, NAND requires ECC to ensure data integrity. NAND
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Coding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview
Technical Note TN-29-06: NAND Flash Controller on Spartan-3 Overview Micron NAND Flash Controller via Xilinx Spartan -3 FPGA Overview As mobile product capabilities continue to expand, so does the demand
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
N O T E S. A Reed Solomon Code Magic Trick. The magic trick T O D D D. M A T E E R
N O T E S A Reed Solomon Code Magic Trick T O D D D. M A T E E R Howard Community College Columbia, Maryland 21044 [email protected] Richard Ehrenborg [1] has provided a nice magic trick that can be
How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)
FPGA IMPLEMENTATION OF 4D-PARITY BASED DATA CODING TECHNIQUE Vijay Tawar 1, Rajani Gupta 2 1 Student, KNPCST, Hoshangabad Road, Misrod, Bhopal, Pin no.462047 2 Head of Department (EC), KNPCST, Hoshangabad
Efficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Multiple Connection Telephone System with Voice Messaging
Multiple Connection Telephone System with Voice Messaging Rumen Hristov, Alan Medina 6.111 Project Proposal Fall 2015 Introduction We propose building a two-way telephone system. We will utilize two FPGAs,
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE
Software Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
Key Agreement from Close Secrets over Unsecured Channels Winter 2010
Key Agreement from Close Secrets over Unsecured Channels Winter 2010 Andreas Keller Contens 1. Motivation 2. Introduction 3. Building Blocks 4. Protocol Extractor Secure Sketches (MAC) message authentication
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
KEEP IT SYNPLE STUPID
Utilizing Programmable Logic for Analyzing Hardware Targets Dmitry Nedospasov SHORT DESCRIPTION Hardware security analysis differs from software security analysis primarily in the tools
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
ATV Data Link Simulator: A Development based on a CCSDS Layers Framework
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2089 ATV Data Link Simulator: A Development based on a CCSDS
Architectures and Platforms
Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
The Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
Relay attacks on card payment: vulnerabilities and defences
Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Design and Implementation of an Open Ended Automated Vault Security System
Design and Implementation of an Open Ended Automated Vault Security System Saunak Mitra Sarit Hati Diganta Sengupta Indraneel Datta Pratim Sinha Roy Soumyanil Banerjee Future Institute of Engineering and
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
Von der Hardware zur Software in FPGAs mit Embedded Prozessoren. Alexander Hahn Senior Field Application Engineer Lattice Semiconductor
Von der Hardware zur Software in FPGAs mit Embedded Prozessoren Alexander Hahn Senior Field Application Engineer Lattice Semiconductor AGENDA Overview Mico32 Embedded Processor Development Tool Chain HW/SW
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Non-Data Aided Carrier Offset Compensation for SDR Implementation
Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
