Next Article in Journal
A Secure Algorithm for Inversion Modulo 2k
Previous Article in Journal
Barrel Shifter Physical Unclonable Function Based Encryption
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(3), 21;

Correlation-Based Robust Authentication (Cobra) Using Helper Data Only

Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA
IC-Safety, LLC, Albuquerque, NM 87131, USA
Trusted and Secure Systems, LLC, Round Rock, TX 78665, USA
Author to whom correspondence should be addressed.
Received: 3 July 2018 / Revised: 26 August 2018 / Accepted: 28 August 2018 / Published: 31 August 2018
(This article belongs to the Section Hardware Security)
Full-Text   |   PDF [3738 KB, uploaded 31 August 2018]   |  


Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong challenge-response form of authentication for internet of things (IoT) and embedded applications. A special class of so called strong PUFs are best suited for authentication because they are able to generate an exponential number of challenge-response-pairs (CRPs). However, strong PUFs must also be resilient to model-building attacks. Model-building utilizes machine learning algorithms and a small set of CRPs to build a model that is able to predict the responses of a fielded chip, thereby compromising the security of chip-server interactions. In this paper, response bitstrings are eliminated in the message exchanges between chips and the server during authentication, and therefore, it is no longer possible to carry out model-building attacks in the traditional manner. Instead, the chip transmits a Helper Data bitstring to the server and this information is used for authentication instead. The server constructs Helper Data bitstrings using enrollment data that it stores for all valid chips in a secure database and computes correlation coefficients (CCs) between the chip’s Helper Data bitstring and each of the server-generated Helper Data bitstrings. The server authenticates (and identifies) the chip if a CC is found that exceeds a threshold, which is determined during characterization. The technique is demonstrated using data from a set of 500 Xilinx Zynq 7020 FPGAs, subjected to industrial-level temperature and voltage variations. View Full-Text
Keywords: PUF-based authentication; Helper Data correlation; hardware security PUF-based authentication; Helper Data correlation; hardware security

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Plusquellic, J.; Areno, M. Correlation-Based Robust Authentication (Cobra) Using Helper Data Only. Cryptography 2018, 2, 21.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics



[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top