{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:24:57Z","timestamp":1762507497047,"version":"build-2065373602"},"reference-count":21,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong challenge-response form of authentication for internet of things (IoT) and embedded applications. A special class of so called strong PUFs are best suited for authentication because they are able to generate an exponential number of challenge-response-pairs (CRPs). However, strong PUFs must also be resilient to model-building attacks. Model-building utilizes machine learning algorithms and a small set of CRPs to build a model that is able to predict the responses of a fielded chip, thereby compromising the security of chip-server interactions. In this paper, response bitstrings are eliminated in the message exchanges between chips and the server during authentication, and therefore, it is no longer possible to carry out model-building attacks in the traditional manner. Instead, the chip transmits a Helper Data bitstring to the server and this information is used for authentication instead. The server constructs Helper Data bitstrings using enrollment data that it stores for all valid chips in a secure database and computes correlation coefficients (CCs) between the chip\u2019s Helper Data bitstring and each of the server-generated Helper Data bitstrings. The server authenticates (and identifies) the chip if a CC is found that exceeds a threshold, which is determined during characterization. The technique is demonstrated using data from a set of 500 Xilinx Zynq 7020 FPGAs, subjected to industrial-level temperature and voltage variations.<\/jats:p>","DOI":"10.3390\/cryptography2030021","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T10:57:52Z","timestamp":1535713072000},"page":"21","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Correlation-Based Robust Authentication (Cobra) Using Helper Data Only"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1876-117X","authenticated-orcid":false,"given":"Jim","family":"Plusquellic","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"},{"name":"IC-Safety, LLC, Albuquerque, NM 87131, USA"}]},{"given":"Matt","family":"Areno","sequence":"additional","affiliation":[{"name":"Trusted and Secure Systems, LLC, Round Rock, TX 78665, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., and Robins, G. (2007, January 19\u201323). Physically Unclonable Function-based Security and Privacy in RFID Systems. Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201907), White Plains, NY, USA.","DOI":"10.1109\/PERCOM.2007.26"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1016\/j.pmcj.2008.07.001","article-title":"A Tamper-Proof and Lightweight Authentication Scheme","volume":"4","author":"Hammouri","year":"2008","journal-title":"Pervasive Mob. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Visconti, I., and Wachsmann, C. (2010). Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security, Springer. Information Security and Cryptography.","DOI":"10.1007\/978-3-642-14452-3_13"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kocabas, U., Peter, A., Katzenbeisser, S., and Sadeghi, A. (2012). Converse PUF-Based Authentication. Trust and Trustworthy Computing, Springer.","DOI":"10.1007\/978-3-642-30921-2_9"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D.S., and Devadas, S. (2012, January 24\u201325). Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching. Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshop, San Francisco, CA, USA.","DOI":"10.1109\/SPW.2012.30"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1049\/iet-ifs.2015.0401","article-title":"Compact and Low-power ASIP Design for Lightweight PUF-based Authentication Protocols","volume":"10","author":"Aysu","year":"2016","journal-title":"IET Inf. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Che, W., Martin, M., Pocklassery, G., Kajuluri, V.K., Saqib, F., and Plusquellic, J. (2017). A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. Cryptography, 1.","DOI":"10.3390\/cryptography1010003"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Aarestad, J., Ortiz, P., Acharyya, D., and Plusquellic, J.F. (2013). HELP: A Hardware-Embedded Delay-Based PUF. Des. Test Comput., 17\u201325.","DOI":"10.1109\/MDT.2013.2247459"},{"key":"ref_9","unstructured":"(2013, March 30). UNM Publication. Available online: http:\/\/ece-research.unm.edu\/jimp\/pubs\/ARB_PUF.pdf."},{"key":"ref_10","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., and Devadas, S. (2012, January 18\u201322). Silicon Physical Unknown Functions. Proceedings of the ACM Conference on Computer and Communications Security, Washington, DC, USA."},{"key":"ref_11","unstructured":"Lofstrom, K., Daasch, W.R., and Taylor, D. (2000, January 9). IC Identification Circuits using Device Mismatch. Proceedings of the International Solid State Circuits Conference, San Francisco, CA, USA."},{"key":"ref_12","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., and Tuyls, P. (2007, January 10\u201313). FPGA Intrinsic PUFs and their use for IP Protection. Proceedings of the Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., and Smith, A. (2004, January 2\u20136). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Proceedings of the Advances in Cryptology (EUROCRYPT), Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref_14","unstructured":"Bosch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., and Tuyles, P. (2008, January 10\u201313). Efficient Helper Data Key Extractor on FPGAs. Proceedings of the Workshop Cryptographic Hardware and Embedded Systems (CHES), Washington, DC, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Helinski, R., Acharyya, D., and Plusquellic, J. (2009, January 26\u201331). A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations. Proceedings of the Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/1629911.1630089"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Che, W., Bhunia, S., and Plusquellic, J. (2014, January 3\u20136). A Non-Volatile Memory based Physically Unclonable Function without Helper Data. Proceedings of the International Conference on Computer-Aided Design, San Jose, CA, USA.","DOI":"10.1109\/ICCAD.2014.7001345"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Che, W., Kajuluri, V.K., Martin, M., Saqib, F., and Plusquellic, J.F. (2017). Analysis of Entropy in a Hardware-Embedded Delay PUF. Cryptography, 1.","DOI":"10.3390\/cryptography1010008"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TVLSI.2017.2785270","article-title":"Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF","volume":"26","author":"Che","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_19","unstructured":"(2018, April 01). See Video Tutorials Labeled \u2018HELP\u2019 and \u2018HELP Protocol\u2019. Available online: http:\/\/ece-research.unm.edu\/jimp\/HOST\/index.html."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Che, W., Martinez-Ramon, M., Saqib, F., and Plusquellic, J. (2018, January 1\u20137). Delay Model and Machine Learning Exploration of a Hardware-Embedded Delay PUF. Proceedings of the Symposium on Hardware-Oriented Security and Trust (HOST), Washington, DC, USA.","DOI":"10.1109\/HST.2018.8383905"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Che, W., Kajuluri, V.K., Saqib, F., and Plusquellic, J. (2017). Leveraging Distributions in Physical Unclonable Functions. Cryptography, 1.","DOI":"10.3390\/cryptography1030017"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/21\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:22:18Z","timestamp":1760196138000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,31]]},"references-count":21,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["cryptography2030021"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2030021","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2018,8,31]]}}}