SlideShare a Scribd company logo
1 of 30
Download to read offline
Physically Unclonable Functions
       In a M2M Authentication context
       Atos Worldline
       dd-mm-yyyy




Transactional services. Powering progress
    | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                      Project definition
                                         j


                                       Physically Unclonable Functions
                                         Hardware Layer
                                         Applicative Layer
                                    Project status & Conclusion

2  | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    Context : ADS+ Consortium




3  | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




▶ S&M Industries




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




▶ S&M Industries




▶ Labs



▶ Funding Agency




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




▶ S&M Industries




▶ Labs



▶ Funding Agency




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




▶ S&M Industries




▶ Labs



▶ Funding Agency




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
ADS+ Consortium


▶ Bank & Industry




▶ S&M Industries




▶ Labs



▶ Funding Agency




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                     Project definition
                                        j




10 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Context of Project

    Needs and requirements bound to the payment card are heavier
    Management becomes more and more complex and expensive




                                              to design and validate a new open and
                                             standard POI (Point of Infrastructure)
                                              Architecture for the Distribution of
                                                         secure Services
                                                                                               standardization
                                                                                               proposals
                                                                                               (EPAS, ISO)

                                    A Web                                         Major scientific
                                    architecture   - a thin client POI
                                                   - A server of infrastructure   and industrial
                                                   - Some ADS+ services           impacts



   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Kinematics

                   merchant


                                            secure channel
                                               Merchant
                                             establishment
                                            Authentication



                                                             Infrastructure




                                    ADS+ services

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
10/10/2010

  Kinematics                                        Confidential


                   merchant




                                                         Infrastructure




                         Customer
                                    ADS+ services

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Technical innovation on the POI


        Replace the certificats x.509 in
                                                   Composants Authentication
                      POI




                                       PUF Technology



         Low cost                                                No private key to
                                                                     protect
                                    less complex than PKI

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                     Project definition
                                        j


                                      Physically Unclonable Functions




15 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
PUF Concepts

    Introduced by Pappu (cf Physical One Way Functions 2001)
                         (cf.         One-Way Functions,


     The observation :

           Component manufacturing processes induce minor 
           differences between two objects yet being made under 
           the same conditions


      The idea :
          To exploit these minor differences to generate a secret




   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
How to generate a secret ?
        g




                                                      Black
                     Application        challenge             Response
                                                       Box



        Error detect o a d co ect o
           o detection and correction   Noisy




                                        SRAM PUF
                                              PUF,
                    Hardware
                                        Optical PUF
                                        Coating PUF
                                        Arbiter PUF

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Categories of PUFs
    g


     t-Strong PUF vs Weak PUF

      « a Strong t-PUF has a sufficient number of Challenge-response pairs
     such that it is difficult for an Attackers, who obtained some challenge-
     response p
        p      pairs during a time t, to p
                             g         ,   predict a response from a challenge
                                                        p                   g
     with a high probability »

      Source : Rührmair, Sölter, Selmke On the foundation of Physical Unclonable Functions (2009)

    C
     Controlled PUF vs U
           ll d        Uncontrolled PUF
                               ll d
                                       Controlled PUF


                                            Black
                        Challenge                                Response
                                             box

                          Can forbid                         Can encrypt and hash


   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                     Project definition
                                        j


                                      Physically Unclonable Functions
                                        Hardware Layer




19 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Optical PUF


                                     Response
           Transparent with random
           scatterers



              Challen
                   ge




20 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Coating PUF

                                     random dielectric particles




C a e ge
Challenge
(voltage of a                                               Response
                                                            R
certain frequency                                           (a random
and amplitude)                                              capacitan
                                                            ce
                                    Metal sensors
                                                            Value)



21 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Arbiter PUF


                                C1      C2   CN




                                    1   1    1


                                    0   0    0



                                    0   0    0


                                    1   1    1




22 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
SRAM PUF


                                    C1   C1   1 0 0 0 0 0 0 1


                                         C2   0 0 1 0 0 1 0 1
                                    C2
                                                                REPONSE
         CHALLENGE                            1 1 0 1 0 1 1 0


                                              0 0 0 1 0 0 0 1



                                         Cn   0 1 1 1 0 0 0 0



                                    Cn




23 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                     Project definition
                                        j


                                      Physically Unclonable Functions
                                        Hardware Layer
                                        Applicative Layer



24 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
The PUF response as session key
           p                  y


    Enrollment phase

                     PUF 1                                 1   c1   r1


                                                               cm   rm

                                                     DB
                                                           n   c1   r1
                     PUF n
                                                               cm   rm


     Session key establishment
                                         Id                         id   c1   r1
                  PUF
                                        c1
                                                          DB
                r1      Black box                                        cm   rm


                                    Session Key r1


   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
The PUF response for Authentication
           p


  Enrollment phase                                 < gk> a group
                                                    Ri = gri where ri is a PUF response to challenge ci

                         PUF 1                                                                1        c1        R1


                                                                                                       cm        Rm

                                                                                 BD
                                                                                              n        c1        R1

                         PUF n                                                                         cm        Rm


   PUF authentication
                                               Id
             PUF                                                                                  id        c1        R1
                                              c1                                 BD
                       Black box
             r1                                                                                         cm            Rm

                                    Zero–Knowledge proof

Keith B. Frikken, Marina Blanton, Mikhail J. Atallah Robust Authentication using physically unclonable functions (2009) .

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
The PUFs to create a secure channel


               - PUF uses in key exchange protocol

                       Data base attacks                 Impersonate the PUF


               - PUF uses in a authentication protocol

                            No shared secret             No session Key


                - A secure channel : authentication + session key


          A new protocol has been developed : DHZKP protocol

   | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Summary



                                    ADS+ Consortium

                                      Project definition
                                         j


                                       Physically Unclonable Functions
                                         Hardware Layer
                                         Applicative Layer
                                    Project status & Conclusion

28 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Conclusion


▶ Physically Unclonable Function
  – Use Physical characteristic to extract unique pattern
  – Less expensive than a secure element
  – Use cases : Anti-Counterfeit, M2M authentication
▶ ADS+
  – M2M context
  – Replace PKI by a disruptive technology
  – Our PUF can be considered strong as we are in a Tamper Resistant Device
                                      g                   p
▶ Protocol Layer : Our DHZKP
  – Scientific Papier about the DHZKP protocol (We are making the security proof)
  – RFC about the TLS extension by DHZKP
  – Tests in a real situation (POI / server)
  – Open source




29 | 16-11-2011| Cauchie Stéphane
O&D-R&D Team
Thanks


                                                                For more information please contact:
                                                                T+ 33 1 98765432
                                                                F+
                                                                F 33 1 88888888
                                                                M+ 33 6 44445678
                                                                firstname.lastname@atos.net

                                                                Atos (Country and legal form)
                                                                     (      y        g      )
                                                                Address
 atos.net                                                       post/zip code, location

Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud and Atos WorldGrid
are registered trademarks of Atos SA. October 2011
© 2011 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it,
may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos.

Transactional services. Powering progress                                               © Confidential
    | 16-11-2011| Cauchie Stéphane
O&D-R&D Team

More Related Content

Similar to Physically Unclonable Functions In a M2M Authentication context

ScienceSoft: Open Software for Open Science
ScienceSoft: Open Software for Open ScienceScienceSoft: Open Software for Open Science
ScienceSoft: Open Software for Open Science
SoftwarePractice
 
Satellite Applications Catapult Centre Overview
Satellite Applications Catapult Centre OverviewSatellite Applications Catapult Centre Overview
Satellite Applications Catapult Centre Overview
A. Rocketeer
 

Similar to Physically Unclonable Functions In a M2M Authentication context (20)

Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711
 
20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services
 
Experimental Study Using Functional Size Measurement in Building Estimation M...
Experimental Study Using Functional Size Measurement in Building Estimation M...Experimental Study Using Functional Size Measurement in Building Estimation M...
Experimental Study Using Functional Size Measurement in Building Estimation M...
 
Experimental Study Using Functional Size Measurement in Building Estimation M...
Experimental Study Using Functional Size Measurement in Building Estimation M...Experimental Study Using Functional Size Measurement in Building Estimation M...
Experimental Study Using Functional Size Measurement in Building Estimation M...
 
ScienceSoft: Open Software for Open Science
ScienceSoft: Open Software for Open ScienceScienceSoft: Open Software for Open Science
ScienceSoft: Open Software for Open Science
 
A Valuable ‘Data Experience’
A Valuable ‘Data Experience’A Valuable ‘Data Experience’
A Valuable ‘Data Experience’
 
Satellite Applications Catapult Centre Overview
Satellite Applications Catapult Centre OverviewSatellite Applications Catapult Centre Overview
Satellite Applications Catapult Centre Overview
 
Gda Panel
Gda PanelGda Panel
Gda Panel
 
Systematic 6th Internal Convention, June 15, 2011, Paris
Systematic 6th Internal Convention, June 15, 2011, ParisSystematic 6th Internal Convention, June 15, 2011, Paris
Systematic 6th Internal Convention, June 15, 2011, Paris
 
Long way from ideas and needs to software measurement standards - Failures, s...
Long way from ideas and needs to software measurement standards - Failures, s...Long way from ideas and needs to software measurement standards - Failures, s...
Long way from ideas and needs to software measurement standards - Failures, s...
 
Measuring web performance. Velocity EU 2011
Measuring web performance. Velocity EU 2011Measuring web performance. Velocity EU 2011
Measuring web performance. Velocity EU 2011
 
Coveo Search - Product Overview
Coveo Search - Product OverviewCoveo Search - Product Overview
Coveo Search - Product Overview
 
Trm for mtec
Trm for mtecTrm for mtec
Trm for mtec
 
Presentation of aviation
Presentation of aviationPresentation of aviation
Presentation of aviation
 
20080325 Software, Services, and Semantics in FP7
20080325 Software, Services, and Semantics in FP720080325 Software, Services, and Semantics in FP7
20080325 Software, Services, and Semantics in FP7
 
A proposal for a new common process scope for AutomotiveSPICE: Six reasons fo...
A proposal for a new common process scope for AutomotiveSPICE: Six reasons fo...A proposal for a new common process scope for AutomotiveSPICE: Six reasons fo...
A proposal for a new common process scope for AutomotiveSPICE: Six reasons fo...
 
Nagios Conference 2011 - Christian Mies - German Health Insurance Company Ref...
Nagios Conference 2011 - Christian Mies - German Health Insurance Company Ref...Nagios Conference 2011 - Christian Mies - German Health Insurance Company Ref...
Nagios Conference 2011 - Christian Mies - German Health Insurance Company Ref...
 
ServiceNow Event 15.11.2012 / Beispiele aus Kundenprojekten von Aspediens
ServiceNow Event 15.11.2012 / Beispiele aus Kundenprojekten von AspediensServiceNow Event 15.11.2012 / Beispiele aus Kundenprojekten von Aspediens
ServiceNow Event 15.11.2012 / Beispiele aus Kundenprojekten von Aspediens
 
Micro Focus - Not only Cobol
Micro Focus - Not only CobolMicro Focus - Not only Cobol
Micro Focus - Not only Cobol
 
Iess10 I 2 Avs@Iess1 0 Presentation V0 4
Iess10 I 2 Avs@Iess1 0 Presentation V0 4Iess10 I 2 Avs@Iess1 0 Presentation V0 4
Iess10 I 2 Avs@Iess1 0 Presentation V0 4
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Physically Unclonable Functions In a M2M Authentication context

  • 1. Physically Unclonable Functions In a M2M Authentication context Atos Worldline dd-mm-yyyy Transactional services. Powering progress | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 2. Summary ADS+ Consortium Project definition j Physically Unclonable Functions Hardware Layer Applicative Layer Project status & Conclusion 2 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 3. Summary Context : ADS+ Consortium 3 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 4. ADS+ Consortium ▶ Bank & Industry | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 5. ADS+ Consortium ▶ Bank & Industry ▶ S&M Industries | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 6. ADS+ Consortium ▶ Bank & Industry ▶ S&M Industries ▶ Labs ▶ Funding Agency | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 7. ADS+ Consortium ▶ Bank & Industry ▶ S&M Industries ▶ Labs ▶ Funding Agency | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 8. ADS+ Consortium ▶ Bank & Industry ▶ S&M Industries ▶ Labs ▶ Funding Agency | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 9. ADS+ Consortium ▶ Bank & Industry ▶ S&M Industries ▶ Labs ▶ Funding Agency | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 10. Summary ADS+ Consortium Project definition j 10 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 11. Context of Project Needs and requirements bound to the payment card are heavier Management becomes more and more complex and expensive to design and validate a new open and standard POI (Point of Infrastructure) Architecture for the Distribution of secure Services standardization proposals (EPAS, ISO) A Web Major scientific architecture - a thin client POI - A server of infrastructure and industrial - Some ADS+ services impacts | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 12. Kinematics merchant secure channel Merchant establishment Authentication Infrastructure ADS+ services | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 13. 10/10/2010 Kinematics Confidential merchant Infrastructure Customer ADS+ services | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 14. Technical innovation on the POI Replace the certificats x.509 in Composants Authentication POI PUF Technology Low cost No private key to protect less complex than PKI | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 15. Summary ADS+ Consortium Project definition j Physically Unclonable Functions 15 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 16. PUF Concepts  Introduced by Pappu (cf Physical One Way Functions 2001) (cf. One-Way Functions,  The observation : Component manufacturing processes induce minor  differences between two objects yet being made under  the same conditions  The idea : To exploit these minor differences to generate a secret | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 17. How to generate a secret ? g Black Application challenge Response Box Error detect o a d co ect o o detection and correction Noisy SRAM PUF PUF, Hardware Optical PUF Coating PUF Arbiter PUF | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 18. Categories of PUFs g  t-Strong PUF vs Weak PUF « a Strong t-PUF has a sufficient number of Challenge-response pairs such that it is difficult for an Attackers, who obtained some challenge- response p p pairs during a time t, to p g , predict a response from a challenge p g with a high probability » Source : Rührmair, Sölter, Selmke On the foundation of Physical Unclonable Functions (2009) C Controlled PUF vs U ll d Uncontrolled PUF ll d Controlled PUF Black Challenge Response box Can forbid Can encrypt and hash | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 19. Summary ADS+ Consortium Project definition j Physically Unclonable Functions Hardware Layer 19 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 20. Optical PUF Response Transparent with random scatterers Challen ge 20 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 21. Coating PUF random dielectric particles C a e ge Challenge (voltage of a Response R certain frequency (a random and amplitude) capacitan ce Metal sensors Value) 21 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 22. Arbiter PUF C1 C2 CN 1 1 1 0 0 0 0 0 0 1 1 1 22 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 23. SRAM PUF C1 C1 1 0 0 0 0 0 0 1 C2 0 0 1 0 0 1 0 1 C2 REPONSE CHALLENGE 1 1 0 1 0 1 1 0 0 0 0 1 0 0 0 1 Cn 0 1 1 1 0 0 0 0 Cn 23 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 24. Summary ADS+ Consortium Project definition j Physically Unclonable Functions Hardware Layer Applicative Layer 24 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 25. The PUF response as session key p y  Enrollment phase PUF 1 1 c1 r1 cm rm DB n c1 r1 PUF n cm rm  Session key establishment Id id c1 r1 PUF c1 DB r1 Black box cm rm Session Key r1 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 26. The PUF response for Authentication p Enrollment phase < gk> a group Ri = gri where ri is a PUF response to challenge ci PUF 1 1 c1 R1 cm Rm BD n c1 R1 PUF n cm Rm  PUF authentication Id PUF id c1 R1 c1 BD Black box r1 cm Rm Zero–Knowledge proof Keith B. Frikken, Marina Blanton, Mikhail J. Atallah Robust Authentication using physically unclonable functions (2009) . | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 27. The PUFs to create a secure channel - PUF uses in key exchange protocol Data base attacks Impersonate the PUF - PUF uses in a authentication protocol No shared secret No session Key - A secure channel : authentication + session key A new protocol has been developed : DHZKP protocol | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 28. Summary ADS+ Consortium Project definition j Physically Unclonable Functions Hardware Layer Applicative Layer Project status & Conclusion 28 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 29. Conclusion ▶ Physically Unclonable Function – Use Physical characteristic to extract unique pattern – Less expensive than a secure element – Use cases : Anti-Counterfeit, M2M authentication ▶ ADS+ – M2M context – Replace PKI by a disruptive technology – Our PUF can be considered strong as we are in a Tamper Resistant Device g p ▶ Protocol Layer : Our DHZKP – Scientific Papier about the DHZKP protocol (We are making the security proof) – RFC about the TLS extension by DHZKP – Tests in a real situation (POI / server) – Open source 29 | 16-11-2011| Cauchie Stéphane O&D-R&D Team
  • 30. Thanks For more information please contact: T+ 33 1 98765432 F+ F 33 1 88888888 M+ 33 6 44445678 firstname.lastname@atos.net Atos (Country and legal form) ( y g ) Address atos.net post/zip code, location Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud and Atos WorldGrid are registered trademarks of Atos SA. October 2011 © 2011 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos. Transactional services. Powering progress © Confidential | 16-11-2011| Cauchie Stéphane O&D-R&D Team