SlideShare a Scribd company logo
1 of 32
Download to read offline
Physically Unclonable Random Permutations
Riccardo Bernardini and Roberto Rinaldo
University of Udine–Italy
{riccardo.bernardini, rinaldo}@uniud.it
Recent Adv. in Electrical and Electronic Eng. (Florence, 2014)
Full article version:
http://link.springer.com/article/10.1007/s10207-016-0324-2
January 30, 2017
Physically Unclonable Random Permutations
Outline
• The problem
• Motivation
• The solution(s)
• Conclusions
1
DIEGM University of Udine
Physically Unclonable Random Permutations
The problem
• PUCs (Physically Unclonable Constants) allow to embed in chip
unique random bitstrings.
Embed in a device a unique permutation/involution on S = {1, . . . , N}
permutation ⇒ bijective map π : S → S
involution ⇒ π ◦ π = id, ∀x π(x) = x
Why?
– It is scientifically intriguing, but also. . .
– Potentially useful for “private” cryptography
2
DIEGM University of Udine
Physically Unclonable Random Permutations
Motivation: sponges
Example: sponges
• Flexible building block (hash, PRNG, Authenticated Encryption, . . . )
• Map f can be a permutation
3
DIEGM University of Udine
Physically Unclonable Random Permutations
Motivation: stream cypher
4
DIEGM University of Udine
Physically Unclonable Random Permutations
Motivation: stream cypher (2)
Warning!
5
DIEGM University of Udine
Physically Unclonable Random Permutations
Motivation: stream cypher (3)
Stream cypher + permutation
6
DIEGM University of Udine
Physically Unclonable Random Permutations
Permutation: How To
• Permutation/involution implemented as a Look-Up Table (LUT)
in RAM
• LUT filled at start-up by a processing block that uses a PUC as
source of randomness
• Only simple processing allowed
– No floating point
– Informally: ≈ 1 day work to write it in assembly 6502
– Complexity:
∗ LUT size = N log2 N bits ⇒ O(N log N) OK
7
DIEGM University of Udine
Physically Unclonable Random Permutations
Permutation: How To
K-bit
PUC
Processing
Look-up
Table
(RAM)
Addr
Data
K-bit
PUC
Processing
Look-up
Table
(RAM)
Addr
Data
x
π(x)
at start-up run-time
8
DIEGM University of Udine
Physically Unclonable Random Permutations
Permutation/Involution: How many bits?
Permutation log2(N!) ≈ N(log2 N − 1.44) ≈ N log2 N
Involution log2(N!!) ≈ N
2 log2 N
d N = 2d log2(N!) log2(N!!)
4 16 45 21
6 64 296 147
8 256 1684 840
10 1024 8770 4382
14 16384 205 748 102 870
16 65536 954 037 477 015
9
DIEGM University of Udine
Physically Unclonable Random Permutations
Random permutation: how to
• Problem: randomly permute the entries of array[0..N-1]
• Well-known solution:
– for k in 0 .. N-2 loop
– swap array[k] and array[k + rand(0 .. N-1-k)];
– end loop;
• We need random numbers
n ∈ {0, . . . , }, = 1, . . . , N − 1
10
DIEGM University of Udine
Physically Unclonable Random Permutations
Implementation Example
Register 2
LUTAddr Data
PUC RND
Counter
Register 1
Clk
≅ N log2 N
N log2 N
log2 N
log2 N
log2 N
11
DIEGM University of Udine
Physically Unclonable Random Permutations
Implementation Example
Register 2
LUTAddr Data
PUC RND
Counter
Register 1
Clk
12
DIEGM University of Udine
Physically Unclonable Random Permutations
Implementation Example
Register 2
LUTAddr Data
PUC RND
Counter
Register 1
Clk
13
DIEGM University of Udine
Physically Unclonable Random Permutations
Implementation Example
Register 2
LUTAddr Data
PUC RND
Counter
Register 1
Clk
14
DIEGM University of Udine
Physically Unclonable Random Permutations
Implementation Example
Register 2
LUTAddr Data
PUC RND
Counter
Register 1
Clk
15
DIEGM University of Udine
Physically Unclonable Random Permutations
Random involutions: how to
• An involution is described by the pairs (x, π(x)).
– S= {1, . . . , N}
– while S = ∅ loop
– x ← min(S); --Assign and extract
– n := rand(1..|S|);
– y ← n-th element of S;
– (x,y) is the new pair;
– end loop;
• We need random numbers
n ∈ {1, 2, 3, . . . , 2 − 1}, ∈ {1, . . . , N/2}
16
DIEGM University of Udine
Physically Unclonable Random Permutations
Random integers: how hard can be?
Everything we need is a way to generate random inte-
gers in {0, . . . , L − 1}, L = 2, 3, . . . , N
• Everything we have is a string of random bit from a PUC
The case L = 2d is easy ⇒ just get a block of d bit
What about when L = 2d?
17
DIEGM University of Udine
Random Integers
Modulo Reduction
Physically Unclonable Random Permutations
Random Integers
• Use modular reduction
– Let d = log2 L
– Get d random bits and make them into a number n
– Return n mod L
Simple, minimun number of bits
Not uniform: outcomes 0 . . . 2d − 1 − L are more probable
18
DIEGM University of Udine
Physically Unclonable Random Permutations
How much serious is the unbalance?
• Let ΠN a uniformly chosen random permutation
• Let ΠN the generated permutation
• Theorem:
∆N := H(ΠN) − H(ΠN) < 0.09N
• Note that H(ΠN) ≈ N log2 N, so that
lim
N→∞
∆N
H(ΠN)
= 0
19
DIEGM University of Udine
Random Integers
Rejection method
Physically Unclonable Random Permutations
Rejection method
• Use rejection
1. Get d bits and make them into a number n
2. If n < L return it
3. Go to 1
More than d bits needed (in average)
Uniform outcome
20
DIEGM University of Udine
Physically Unclonable Random Permutations
How many bits?
Single number
• Probability of rejection
qL = P[n ≥ L] =
2d − L
2d
= 1 −
L
2d
< 1/2
• # of bit needed = “interpolated” geometric
P[k bits needed] = fL(k) :=



0 if L |k
q
k/L−1
L (1 − qL) if L|k
• Let BL be the required number of bits
21
DIEGM University of Udine
Physically Unclonable Random Permutations
How many bits? (2)
Permutation
• R.v. Bk, k = 1, . . . are independent
• Total number of bits T = k Bk
P[Total bits needed] = P[T = ] = f2 ∗ f3 ∗ · · · ∗ fL( )
• Easily computed numerically
22
DIEGM University of Udine
Physically Unclonable Random Permutations
How many bits do we allocate?
• Fix a probability of discarding the device
• Compute distribution
FT (x) = P[T ≤ x] = cumsum(f2 ∗ · · · ∗ fL)
and choose the number of bit M so that
P[T > M] = 1 − FT (M) ≤ ⇔ FT (M) ≥ 1 −
• Note that
∀x < B(0) :=
N
k=2
log2 k FT (x) = 0
23
DIEGM University of Udine
Physically Unclonable Random Permutations
Redundancy (permutation)
1 1.2 1.4 1.6 1.8
10
−4
10
−3
10
−2
10
−1
10
0
x / optimum
1−F
T
(x)
N=64, opt=296
N=256, opt=1684
N=1024, opt=8770
24
DIEGM University of Udine
Physically Unclonable Random Permutations
Redundancy (involution)
1 1.2 1.4 1.6 1.8
10
−4
10
−3
10
−2
10
−1
10
0
x / optimum
1−F
T
(x)
N=64, opt=147
N=256, opt=840
N=1024, opt=4382
25
DIEGM University of Udine
Random Integers
Composition
Physically Unclonable Random Permutations
Composition
• If L is slightly larger than 2 ⇒
– Few invalid values in the rejection method
– ≈ 0
• If L is sligtly smaller thant 2 ⇒
Use composition
– Generate a number in 0, 1, . . . , L(L + 1) · · · (L + M) − 1
– “Break” the result using divisions
26
DIEGM University of Udine
Physically Unclonable Random Permutations
Composition
Efficient
N. bits N. bits
N = 2d d No comp Comp log2(N!) ∆ no comp ∆ comp
16 4 49 45 45 0.75 0.19
64 6 321 298 296 3.50 0.60
256 8 1793 1687 1684 14.50 0.95
1024 10 9217 8773 8770 58.51 1.32
16384 14 212993 205753 205748 938.71 2.00
65536 16 983041 954044 954037 3755.36 2.52
Increased complexity (division)
27
DIEGM University of Udine
Physically Unclonable Random Permutations
Conclusions
• A method to generate random permutations/involutions from
PUCs has been presented
• The approach is suited for HW implementation
• 2 + 1 alternatives were considered
Technique
Reduction Deterministic N. bits Non-Uniform
Rejection Uniform Redundancy required
Composition More efficient Additional complexity
28
DIEGM University of Udine

More Related Content

What's hot

Artificial Neural Networks Lect8: Neural networks for constrained optimization
Artificial Neural Networks Lect8: Neural networks for constrained optimizationArtificial Neural Networks Lect8: Neural networks for constrained optimization
Artificial Neural Networks Lect8: Neural networks for constrained optimizationMohammed Bennamoun
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...MLconf
 
Low-rank tensor methods for stochastic forward and inverse problems
Low-rank tensor methods for stochastic forward and inverse problemsLow-rank tensor methods for stochastic forward and inverse problems
Low-rank tensor methods for stochastic forward and inverse problemsAlexander Litvinenko
 
Tensorizing Neural Network
Tensorizing Neural NetworkTensorizing Neural Network
Tensorizing Neural NetworkRuochun Tzeng
 
電路學 - [第五章] 一階RC/RL電路
電路學 - [第五章] 一階RC/RL電路電路學 - [第五章] 一階RC/RL電路
電路學 - [第五章] 一階RC/RL電路Simen Li
 
電路學 - [第三章] 網路定理
電路學 - [第三章] 網路定理電路學 - [第三章] 網路定理
電路學 - [第三章] 網路定理Simen Li
 
Lecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformLecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformVARUN KUMAR
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkHiroshi Kuwajima
 
Estimating structured vector autoregressive models
Estimating structured vector autoregressive modelsEstimating structured vector autoregressive models
Estimating structured vector autoregressive modelsAkira Tanimoto
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communicationcseiitgn
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slidesmpurkeypile
 
Quantum mechanics and the square root of the Brownian motion
Quantum mechanics and the square root of the Brownian motionQuantum mechanics and the square root of the Brownian motion
Quantum mechanics and the square root of the Brownian motionMarco Frasca
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applicationsFrank Nielsen
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...MLconf
 
Convex Optimization Modelling with CVXOPT
Convex Optimization Modelling with CVXOPTConvex Optimization Modelling with CVXOPT
Convex Optimization Modelling with CVXOPTandrewmart11
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介Simen Li
 
Pres110811
Pres110811Pres110811
Pres110811shotlub
 

What's hot (20)

Artificial Neural Networks Lect8: Neural networks for constrained optimization
Artificial Neural Networks Lect8: Neural networks for constrained optimizationArtificial Neural Networks Lect8: Neural networks for constrained optimization
Artificial Neural Networks Lect8: Neural networks for constrained optimization
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
 
Low-rank tensor methods for stochastic forward and inverse problems
Low-rank tensor methods for stochastic forward and inverse problemsLow-rank tensor methods for stochastic forward and inverse problems
Low-rank tensor methods for stochastic forward and inverse problems
 
Tensorizing Neural Network
Tensorizing Neural NetworkTensorizing Neural Network
Tensorizing Neural Network
 
電路學 - [第五章] 一階RC/RL電路
電路學 - [第五章] 一階RC/RL電路電路學 - [第五章] 一階RC/RL電路
電路學 - [第五章] 一階RC/RL電路
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
電路學 - [第三章] 網路定理
電路學 - [第三章] 網路定理電路學 - [第三章] 網路定理
電路學 - [第三章] 網路定理
 
Lecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformLecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard Transform
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural Network
 
Estimating structured vector autoregressive models
Estimating structured vector autoregressive modelsEstimating structured vector autoregressive models
Estimating structured vector autoregressive models
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communication
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slides
 
Quantum mechanics and the square root of the Brownian motion
Quantum mechanics and the square root of the Brownian motionQuantum mechanics and the square root of the Brownian motion
Quantum mechanics and the square root of the Brownian motion
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applications
 
03 image transform
03 image transform03 image transform
03 image transform
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
 
Convex Optimization Modelling with CVXOPT
Convex Optimization Modelling with CVXOPTConvex Optimization Modelling with CVXOPT
Convex Optimization Modelling with CVXOPT
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介
 
Pres110811
Pres110811Pres110811
Pres110811
 

Viewers also liked

Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Blue Teamer
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionGreg Foss
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
 
A Very Stable Diode-Based Physically Unclonable Constant
A Very Stable Diode-Based  Physically Unclonable ConstantA Very Stable Diode-Based  Physically Unclonable Constant
A Very Stable Diode-Based Physically Unclonable ConstantRiccardo Bernardini
 
Threat hunting as SOC process
Threat hunting as SOC processThreat hunting as SOC process
Threat hunting as SOC processSergey Soldatov
 
Very stable PUF based on two mosfet
Very stable PUF based on two mosfetVery stable PUF based on two mosfet
Very stable PUF based on two mosfetRiccardo Bernardini
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Kaspersky managed protection
Kaspersky managed protectionKaspersky managed protection
Kaspersky managed protectionSergey Soldatov
 
Трудовые будни охотника на угрозы
Трудовые будни охотника на угрозыТрудовые будни охотника на угрозы
Трудовые будни охотника на угрозыSergey Soldatov
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesDustin Kirkland
 
RTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftRTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftJou Neo
 
Active Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsActive Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsJason Lang
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017WhitewoodOWASP
 
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatovSergey Soldatov
 
Io t security-ameba-ppt
Io t security-ameba-pptIo t security-ameba-ppt
Io t security-ameba-pptJou Neo
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of DreamsGreg Foss
 
Rtos ameba
Rtos amebaRtos ameba
Rtos amebaJou Neo
 

Viewers also liked (20)

Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement Detection
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Two-fet based PUF
Two-fet based PUFTwo-fet based PUF
Two-fet based PUF
 
Dakotacon 2017
Dakotacon 2017Dakotacon 2017
Dakotacon 2017
 
A Very Stable Diode-Based Physically Unclonable Constant
A Very Stable Diode-Based  Physically Unclonable ConstantA Very Stable Diode-Based  Physically Unclonable Constant
A Very Stable Diode-Based Physically Unclonable Constant
 
Threat hunting as SOC process
Threat hunting as SOC processThreat hunting as SOC process
Threat hunting as SOC process
 
Very stable PUF based on two mosfet
Very stable PUF based on two mosfetVery stable PUF based on two mosfet
Very stable PUF based on two mosfet
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Kaspersky managed protection
Kaspersky managed protectionKaspersky managed protection
Kaspersky managed protection
 
Трудовые будни охотника на угрозы
Трудовые будни охотника на угрозыТрудовые будни охотника на угрозы
Трудовые будни охотника на угрозы
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security Features
 
RTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftRTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draft
 
Active Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsActive Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain Admins
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
 
Io t security-ameba-ppt
Io t security-ameba-pptIo t security-ameba-ppt
Io t security-ameba-ppt
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
 
Rtos ameba
Rtos amebaRtos ameba
Rtos ameba
 

Similar to Physically Unclonable Random Permutations

Chap-2 Preliminary Concepts and Linear Finite Elements.pptx
Chap-2 Preliminary Concepts and  Linear Finite Elements.pptxChap-2 Preliminary Concepts and  Linear Finite Elements.pptx
Chap-2 Preliminary Concepts and Linear Finite Elements.pptxSamirsinh Parmar
 
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...Shizuoka Inst. Science and Tech.
 
Recurrence relation solutions
Recurrence relation solutionsRecurrence relation solutions
Recurrence relation solutionssubhashchandra197
 
Presentation M2 internship rare-earth nickelates
Presentation M2 internship rare-earth nickelatesPresentation M2 internship rare-earth nickelates
Presentation M2 internship rare-earth nickelatesYiteng Dang
 
1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptxpallavidhade2
 
Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...Alexander Litvinenko
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixturesChristian Robert
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFTtaha25
 
Defense_Talk
Defense_TalkDefense_Talk
Defense_Talkcastanan2
 
Design, Modeling and control of modular multilevel converters (MMC) based hvd...
Design, Modeling and control of modular multilevel converters (MMC) based hvd...Design, Modeling and control of modular multilevel converters (MMC) based hvd...
Design, Modeling and control of modular multilevel converters (MMC) based hvd...Ghazal Falahi
 

Similar to Physically Unclonable Random Permutations (20)

Chap-2 Preliminary Concepts and Linear Finite Elements.pptx
Chap-2 Preliminary Concepts and  Linear Finite Elements.pptxChap-2 Preliminary Concepts and  Linear Finite Elements.pptx
Chap-2 Preliminary Concepts and Linear Finite Elements.pptx
 
Introduction to Sparse Methods
Introduction to Sparse Methods Introduction to Sparse Methods
Introduction to Sparse Methods
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...
Talk at SciCADE2013 about "Accelerated Multiple Precision ODE solver base on ...
 
Ph ddefence
Ph ddefencePh ddefence
Ph ddefence
 
Recurrence relation solutions
Recurrence relation solutionsRecurrence relation solutions
Recurrence relation solutions
 
Presentation M2 internship rare-earth nickelates
Presentation M2 internship rare-earth nickelatesPresentation M2 internship rare-earth nickelates
Presentation M2 internship rare-earth nickelates
 
Decimation in Time
Decimation in TimeDecimation in Time
Decimation in Time
 
1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx
 
Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...Low rank tensor approximation of probability density and characteristic funct...
Low rank tensor approximation of probability density and characteristic funct...
 
Teknik Simulasi
Teknik SimulasiTeknik Simulasi
Teknik Simulasi
 
CN_slides.pdf
CN_slides.pdfCN_slides.pdf
CN_slides.pdf
 
MS_Defense
MS_DefenseMS_Defense
MS_Defense
 
Algo complexity
Algo complexityAlgo complexity
Algo complexity
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixtures
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFT
 
Defense_Talk
Defense_TalkDefense_Talk
Defense_Talk
 
Design, Modeling and control of modular multilevel converters (MMC) based hvd...
Design, Modeling and control of modular multilevel converters (MMC) based hvd...Design, Modeling and control of modular multilevel converters (MMC) based hvd...
Design, Modeling and control of modular multilevel converters (MMC) based hvd...
 

More from Riccardo Bernardini

Superconductivity: the ICT that came from cold
Superconductivity: the ICT that came from coldSuperconductivity: the ICT that came from cold
Superconductivity: the ICT that came from coldRiccardo Bernardini
 
EUgen: an European project description generator
EUgen: an European project description generatorEUgen: an European project description generator
EUgen: an European project description generatorRiccardo Bernardini
 
Multiple description coding for robust video transmission
Multiple description coding for robust video transmissionMultiple description coding for robust video transmission
Multiple description coding for robust video transmissionRiccardo Bernardini
 
PPETP: A peer-to-peer streaming protocol
PPETP: A peer-to-peer streaming protocolPPETP: A peer-to-peer streaming protocol
PPETP: A peer-to-peer streaming protocolRiccardo Bernardini
 
Terra Bruciata: an open source initiative for software correctness
Terra Bruciata: an open source initiative for software correctnessTerra Bruciata: an open source initiative for software correctness
Terra Bruciata: an open source initiative for software correctnessRiccardo Bernardini
 
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTION
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTIONROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTION
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTIONRiccardo Bernardini
 
Sparse Representation for Fetal QRS Detection in Abdominal ECG Recordings
Sparse Representation for Fetal QRS Detection in Abdominal ECG RecordingsSparse Representation for Fetal QRS Detection in Abdominal ECG Recordings
Sparse Representation for Fetal QRS Detection in Abdominal ECG RecordingsRiccardo Bernardini
 
Gaussian Dictionary for Compressive Sensing of the ECG Signal
Gaussian Dictionary for Compressive Sensing of the ECG SignalGaussian Dictionary for Compressive Sensing of the ECG Signal
Gaussian Dictionary for Compressive Sensing of the ECG SignalRiccardo Bernardini
 

More from Riccardo Bernardini (8)

Superconductivity: the ICT that came from cold
Superconductivity: the ICT that came from coldSuperconductivity: the ICT that came from cold
Superconductivity: the ICT that came from cold
 
EUgen: an European project description generator
EUgen: an European project description generatorEUgen: an European project description generator
EUgen: an European project description generator
 
Multiple description coding for robust video transmission
Multiple description coding for robust video transmissionMultiple description coding for robust video transmission
Multiple description coding for robust video transmission
 
PPETP: A peer-to-peer streaming protocol
PPETP: A peer-to-peer streaming protocolPPETP: A peer-to-peer streaming protocol
PPETP: A peer-to-peer streaming protocol
 
Terra Bruciata: an open source initiative for software correctness
Terra Bruciata: an open source initiative for software correctnessTerra Bruciata: an open source initiative for software correctness
Terra Bruciata: an open source initiative for software correctness
 
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTION
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTIONROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTION
ROBUST RECONSTRUCTION FOR CS-BASED FETAL BEATS DETECTION
 
Sparse Representation for Fetal QRS Detection in Abdominal ECG Recordings
Sparse Representation for Fetal QRS Detection in Abdominal ECG RecordingsSparse Representation for Fetal QRS Detection in Abdominal ECG Recordings
Sparse Representation for Fetal QRS Detection in Abdominal ECG Recordings
 
Gaussian Dictionary for Compressive Sensing of the ECG Signal
Gaussian Dictionary for Compressive Sensing of the ECG SignalGaussian Dictionary for Compressive Sensing of the ECG Signal
Gaussian Dictionary for Compressive Sensing of the ECG Signal
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Physically Unclonable Random Permutations

  • 1. Physically Unclonable Random Permutations Riccardo Bernardini and Roberto Rinaldo University of Udine–Italy {riccardo.bernardini, rinaldo}@uniud.it Recent Adv. in Electrical and Electronic Eng. (Florence, 2014) Full article version: http://link.springer.com/article/10.1007/s10207-016-0324-2 January 30, 2017
  • 2. Physically Unclonable Random Permutations Outline • The problem • Motivation • The solution(s) • Conclusions 1 DIEGM University of Udine
  • 3. Physically Unclonable Random Permutations The problem • PUCs (Physically Unclonable Constants) allow to embed in chip unique random bitstrings. Embed in a device a unique permutation/involution on S = {1, . . . , N} permutation ⇒ bijective map π : S → S involution ⇒ π ◦ π = id, ∀x π(x) = x Why? – It is scientifically intriguing, but also. . . – Potentially useful for “private” cryptography 2 DIEGM University of Udine
  • 4. Physically Unclonable Random Permutations Motivation: sponges Example: sponges • Flexible building block (hash, PRNG, Authenticated Encryption, . . . ) • Map f can be a permutation 3 DIEGM University of Udine
  • 5. Physically Unclonable Random Permutations Motivation: stream cypher 4 DIEGM University of Udine
  • 6. Physically Unclonable Random Permutations Motivation: stream cypher (2) Warning! 5 DIEGM University of Udine
  • 7. Physically Unclonable Random Permutations Motivation: stream cypher (3) Stream cypher + permutation 6 DIEGM University of Udine
  • 8. Physically Unclonable Random Permutations Permutation: How To • Permutation/involution implemented as a Look-Up Table (LUT) in RAM • LUT filled at start-up by a processing block that uses a PUC as source of randomness • Only simple processing allowed – No floating point – Informally: ≈ 1 day work to write it in assembly 6502 – Complexity: ∗ LUT size = N log2 N bits ⇒ O(N log N) OK 7 DIEGM University of Udine
  • 9. Physically Unclonable Random Permutations Permutation: How To K-bit PUC Processing Look-up Table (RAM) Addr Data K-bit PUC Processing Look-up Table (RAM) Addr Data x π(x) at start-up run-time 8 DIEGM University of Udine
  • 10. Physically Unclonable Random Permutations Permutation/Involution: How many bits? Permutation log2(N!) ≈ N(log2 N − 1.44) ≈ N log2 N Involution log2(N!!) ≈ N 2 log2 N d N = 2d log2(N!) log2(N!!) 4 16 45 21 6 64 296 147 8 256 1684 840 10 1024 8770 4382 14 16384 205 748 102 870 16 65536 954 037 477 015 9 DIEGM University of Udine
  • 11. Physically Unclonable Random Permutations Random permutation: how to • Problem: randomly permute the entries of array[0..N-1] • Well-known solution: – for k in 0 .. N-2 loop – swap array[k] and array[k + rand(0 .. N-1-k)]; – end loop; • We need random numbers n ∈ {0, . . . , }, = 1, . . . , N − 1 10 DIEGM University of Udine
  • 12. Physically Unclonable Random Permutations Implementation Example Register 2 LUTAddr Data PUC RND Counter Register 1 Clk ≅ N log2 N N log2 N log2 N log2 N log2 N 11 DIEGM University of Udine
  • 13. Physically Unclonable Random Permutations Implementation Example Register 2 LUTAddr Data PUC RND Counter Register 1 Clk 12 DIEGM University of Udine
  • 14. Physically Unclonable Random Permutations Implementation Example Register 2 LUTAddr Data PUC RND Counter Register 1 Clk 13 DIEGM University of Udine
  • 15. Physically Unclonable Random Permutations Implementation Example Register 2 LUTAddr Data PUC RND Counter Register 1 Clk 14 DIEGM University of Udine
  • 16. Physically Unclonable Random Permutations Implementation Example Register 2 LUTAddr Data PUC RND Counter Register 1 Clk 15 DIEGM University of Udine
  • 17. Physically Unclonable Random Permutations Random involutions: how to • An involution is described by the pairs (x, π(x)). – S= {1, . . . , N} – while S = ∅ loop – x ← min(S); --Assign and extract – n := rand(1..|S|); – y ← n-th element of S; – (x,y) is the new pair; – end loop; • We need random numbers n ∈ {1, 2, 3, . . . , 2 − 1}, ∈ {1, . . . , N/2} 16 DIEGM University of Udine
  • 18. Physically Unclonable Random Permutations Random integers: how hard can be? Everything we need is a way to generate random inte- gers in {0, . . . , L − 1}, L = 2, 3, . . . , N • Everything we have is a string of random bit from a PUC The case L = 2d is easy ⇒ just get a block of d bit What about when L = 2d? 17 DIEGM University of Udine
  • 20. Physically Unclonable Random Permutations Random Integers • Use modular reduction – Let d = log2 L – Get d random bits and make them into a number n – Return n mod L Simple, minimun number of bits Not uniform: outcomes 0 . . . 2d − 1 − L are more probable 18 DIEGM University of Udine
  • 21. Physically Unclonable Random Permutations How much serious is the unbalance? • Let ΠN a uniformly chosen random permutation • Let ΠN the generated permutation • Theorem: ∆N := H(ΠN) − H(ΠN) < 0.09N • Note that H(ΠN) ≈ N log2 N, so that lim N→∞ ∆N H(ΠN) = 0 19 DIEGM University of Udine
  • 23. Physically Unclonable Random Permutations Rejection method • Use rejection 1. Get d bits and make them into a number n 2. If n < L return it 3. Go to 1 More than d bits needed (in average) Uniform outcome 20 DIEGM University of Udine
  • 24. Physically Unclonable Random Permutations How many bits? Single number • Probability of rejection qL = P[n ≥ L] = 2d − L 2d = 1 − L 2d < 1/2 • # of bit needed = “interpolated” geometric P[k bits needed] = fL(k) :=    0 if L |k q k/L−1 L (1 − qL) if L|k • Let BL be the required number of bits 21 DIEGM University of Udine
  • 25. Physically Unclonable Random Permutations How many bits? (2) Permutation • R.v. Bk, k = 1, . . . are independent • Total number of bits T = k Bk P[Total bits needed] = P[T = ] = f2 ∗ f3 ∗ · · · ∗ fL( ) • Easily computed numerically 22 DIEGM University of Udine
  • 26. Physically Unclonable Random Permutations How many bits do we allocate? • Fix a probability of discarding the device • Compute distribution FT (x) = P[T ≤ x] = cumsum(f2 ∗ · · · ∗ fL) and choose the number of bit M so that P[T > M] = 1 − FT (M) ≤ ⇔ FT (M) ≥ 1 − • Note that ∀x < B(0) := N k=2 log2 k FT (x) = 0 23 DIEGM University of Udine
  • 27. Physically Unclonable Random Permutations Redundancy (permutation) 1 1.2 1.4 1.6 1.8 10 −4 10 −3 10 −2 10 −1 10 0 x / optimum 1−F T (x) N=64, opt=296 N=256, opt=1684 N=1024, opt=8770 24 DIEGM University of Udine
  • 28. Physically Unclonable Random Permutations Redundancy (involution) 1 1.2 1.4 1.6 1.8 10 −4 10 −3 10 −2 10 −1 10 0 x / optimum 1−F T (x) N=64, opt=147 N=256, opt=840 N=1024, opt=4382 25 DIEGM University of Udine
  • 30. Physically Unclonable Random Permutations Composition • If L is slightly larger than 2 ⇒ – Few invalid values in the rejection method – ≈ 0 • If L is sligtly smaller thant 2 ⇒ Use composition – Generate a number in 0, 1, . . . , L(L + 1) · · · (L + M) − 1 – “Break” the result using divisions 26 DIEGM University of Udine
  • 31. Physically Unclonable Random Permutations Composition Efficient N. bits N. bits N = 2d d No comp Comp log2(N!) ∆ no comp ∆ comp 16 4 49 45 45 0.75 0.19 64 6 321 298 296 3.50 0.60 256 8 1793 1687 1684 14.50 0.95 1024 10 9217 8773 8770 58.51 1.32 16384 14 212993 205753 205748 938.71 2.00 65536 16 983041 954044 954037 3755.36 2.52 Increased complexity (division) 27 DIEGM University of Udine
  • 32. Physically Unclonable Random Permutations Conclusions • A method to generate random permutations/involutions from PUCs has been presented • The approach is suited for HW implementation • 2 + 1 alternatives were considered Technique Reduction Deterministic N. bits Non-Uniform Rejection Uniform Redundancy required Composition More efficient Additional complexity 28 DIEGM University of Udine