A novel hardware authentication primitive against modeling attacks

Wenrui Liu,Jiafeng Cheng,Nengyuan Sun,Zhaokang Peng,Caiban Sun,Chunyang Wang,Yiming Wen,Hongliu Zhang,Pengcheng Zhang,Weize Yu
DOI: https://doi.org/10.1002/cta.3566
IF: 2.378
2023-02-01
International Journal of Circuit Theory and Applications
Abstract:Traditional hardware security primitives such as physical unclonable functions (PUFs) have unsatisfactory reliability and security since they rely on the slight process mismatches to generate secret information against adversaries. In comparison, the proposed neural network (NN)‐based hardware hash functions exploit the randomness generated by uncorrelated noisy data to break the deterministic relationship between the input challenge and the output response for acquiring high reliability and strong robustness against machine learning attacks. Summary Traditional hardware security primitives such as physical unclonable functions (PUFs) are quite vulnerable to machine learning (ML) attacks. The primary reason is that PUFs rely on process mismatches between two identically designed circuit blocks to generate deterministic math functions as the secret information sources. Unfortunately, ML algorithms are pretty efficient in modeling deterministic math functions. In order to resist against ML attacks, in this letter, a novel hardware security primitive named neural network (NN) chain is proposed by utilizing noise data to generate chaotic NNs for achieving authentication. In a NN chain, two independent batches of noise data are utilized as the input and output training data of NNs, respectively, to maximize the uncertainty within the NN chain. In contrast to a regular PUF, the proposed NN chain is capable of achieving over 20 times ML attack‐resistance and 100% reliability with less than 39% power and area overhead.
engineering, electrical & electronic
What problem does this paper attempt to address?