Skip to main content
Springer logoLink to Springer
. 2017 Jul 5;16(8):200. doi: 10.1007/s11128-017-1649-0

Authenticated communication from quantum readout of PUFs

Boris Škorić 1,, Pepijn W H Pinkse 2, Allard P Mosk 3
PMCID: PMC6979520  PMID: 32025227

Abstract

Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.

Keywords: Physical unclonable function, PUF, Authentication, Quantum readout

Introduction

Authentication

Authentication is an essential part of human interaction and automated transactions. Before one engages in any transaction with an unknown entity, it is prudent to authenticate the other party. We distinguish between authentication of objects and authentication of data. The former is very old. The aim is to verify that an object under scrutiny is exactly the same object that has been seen before, or that it belongs to a class of approved objects. Examples are coins, security holograms, paintings and biometrics. The cat-and-mouse game of counterfeiting versus anti-counterfeiting has been going on for millennia.

In data authentication the aim is twofold: to make sure that the stated origin of data is correct, and to verify that the data was not manipulated after its creation. In many situations the authenticity of data is far more important than confidentiality (secrecy), e.g., monetary transactions, contracts, news, credentials, telemetry, public voting, websites. There are two main approaches. (i) Inscribe the data into an object that is hard to counterfeit and manipulate. Examples are paper money and ID cards containing high-tech authenticity marks. (ii) Use cryptography. In the case of symmetric crypto, Message Authentication Codes; in the case of asymmetric cryptography, digital signatures.

It is interesting to note that the advent of quantum computers will break [24] all currently deployed asymmetric crypto: RSA, Diffie-Hellman and Elliptic Curves [18]. When this ‘Cryptocalypse’ happens, the only leftover asymmetric crypto for authentication will be post-quantum schemes based on, e.g., hashes [6], lattices or error-correcting codes.1

Note also that quantum key distribution2 (QKD) [3, 4, 12, 17, 19, 23] does not solve the problem of authentication in the post-quantum world, since QKD itself requires authenticated classical communication as a starting point.

Quantum readout of physical unclonable functions

The best known classical anti-counterfeiting objects (i.e., without quantum degrees of freedom) are called physical unclonable functions (PUFs) [22]. PUFs are, on technological grounds,3 hard to clone, and they have a highly unique challenge–response behavior when physically probed. In this paper we will not consider the use of PUFs as Physically Obfuscated Keys for secret key storage [13], but only their physical, non-cryptographic anti-counterfeiting use. The best currently known PUF technology of this type is optical PUFs. Optical PUFs are light-diffusing disordered objects that contain many non-absorbing randomly shaped scatterers in random locations. When laser light impinges on them, three-dimensional coherent multiple scattering occurs, resulting in exiting light (transmitted or reflected) that forms a highly complex speckle pattern which depends strongly on the scatterer positions as well as the characteristics of the incoming light such as angle, focus, etc. [15].

From a scientific point of view, there are very appealing aspects to PUF-based authentication. The manufacture and verification of PUFs does not depend on any trade secret, nor does any secret data have to be stored. All stored data are public and have to be protected only against manipulation. Such a ‘fighting with open visors’ approach allows one to organize competitions like those known in cryptography for standardizing ciphers. A possible drawback is the cumbersome enrollment procedure: Challenge–response pairs (CRPs) have to be measured and stored for every PUF individually.

When the verifier has full physical control over the to-be-verified object, a scenario that we refer to as hands on, PUF authentication is ‘perfect’ in the sense that no attack exists other than physical cloning of the PUF. This attack contradicts the security assumption. The situation is more complicated in hands-off scenarios, where the object is far away, or the PUF holder does not want to relinquish control over his PUF. Here typically the verifier has to rely on far-away trusted measurement devices. In the hands-off case, attacks exist on the protocol level, i.e., attacks on the communication or the exchanged light. The attacker either hacks or tricks the remote device: He receives PUF challenges and then feeds into the device the corresponding responses from the publicly known CRP tables. In this way he successfully authenticates without having access to the actual PUF.

A conceptual breakthrough was achieved by the introduction of quantum readout of PUFs [25, 26]. The security is based on the unclonability of unknown quantum states [8, 10, 11, 28]. Quantum readout needs a two-way quantum channel. The challenge is a quantum state that contains more information than what can be extracted from it by measurement. The attacker cannot accurately determine the challenge, and hence the CRP table is of no use. The verifier, on the other hand, knows precisely which response state should be generated by the PUF and can efficiently verify if the returned state matches this. Quantum readout entirely eliminates attacks at the protocol level. Quantum readout has been experimentally demonstrated using optical PUFs [16, 27]. The technique was dubbed quantum secure authentication (QSA).

The focus of QR and QSA in [16, 25] was object authentication. The possibility of data authentication was mentioned but not further explored.

Contributions and outline

In Sect. 2 we introduce the notation and terminology used throughout the paper and briefly review quantum readout of PUFs. The contributions are as follows.

  • We introduce an extension of the QR protocol which authenticates classical data sent by the PUF holder. We call it ‘QR-d.’ QR-d allows the recipient of the classical data to verify that the data were sent by the PUF holder. (Sects. 3.1, 3.2.)

  • For the QSA implementation of QR, we show how a server can be set up which authenticates many messages to many verifiers in parallel. (Sect. 3.3). This setup could be orders of magnitude faster than a server that provides cryptographic signatures.

  • In Sect. 3.4 we show how QSA-d can also be applied to quantum information. Bob sends a quantum state (known to himself) such that Alice is able to verify that it originated from Bob. Alice does not learn the quantum state.

Preliminaries

Notation and terminology

We use the standard bra-ket notation for quantum states. We distinguish between the classical description of a state and the physical state itself. The quantum state is written as |ψ, and its classical description is ψ (without the brackets). Similarly, we distinguish between the matrix R, which consists of classical data, and the operator R^, which acts on quantum states. This is important, e.g., when we deal with a PUF whose action on quantum states is R^: The data R are publicly known and can be used for classical computations, but there exists only one object that is able to perform the operation R^ losslessly on quantum states.

The quantum readout protocol

Quantum readout of PUFs, in its simplest form, works as follows. We consider a challenge space H which is a d-dimensional Hilbert space. A PUF is a classical object that can map a challenge |ψH to a response R^|ψH, where R^ is unique for each PUF. The operator R^ is not necessarily unitary, as it could describe for instance only the reflection or transmission part of scattered light.

Attacker model

We refer to a PUF identity by its transfer matrix R. The main security assumption is: It is infeasible for an attacker who does not have access to a PUF R to perform the action R^ losslessly on a few-photon challenge.

Enrollment phase

A PUF is manufactured. Its properties are measured and then stored in a way that prevents malicious modifications. In the case of optical PUFs, the stored enrollment data could be the transfer matrix R describing the input-output behavior of the PUF. Alternatively, the same information can be stored in the form of a list of CRPs. The PUF is given to the prover, Bob.

Authentication phase

At some later time, a verifier Alice wants to check if Bob still possesses the PUF. Alice fetches the enrollment data for Bob’s PUF. She picks a random ψ, prepares a single particle in the state |ψH and sends it to Bob. Bob lets the particle interact with his PUF, resulting in the response state |ω=R^|ψ. He sends the response state back to Alice. Alice, knowing ψ and R, computes ω=Rψ and performs a measurement of the projection operator |ωω| on the returned state. She repeats the challenge–response procedure multiple times, each time with a freshly random ψ. If enough rounds produced a ‘1’ measurement outcome, Alice is convinced that the particles are being returned by someone who has access to Bob’s PUF.

Security against challenge-estimation attacks

In each round of the above protocol, challenge-estimation attacks have a probability of at most 2/(1+d) to cause a ‘1’. The overall probability of a false accept is exponentially small in the number of rounds. The protocol can be generalized to n-particle states |ψn, in which case the attacker’s per-particle success probability is upper bounded by n+1n+d [26]. The security is based on the unclonability of unknown quantum states [8, 10, 11, 28].

Data authentication from quantum readout

The simplest construction

We propose an extension of QR that achieves authentication of classical data. In the enrollment phase, Bob receives q different PUFs labeled 0,,q-1. Bob wants to send an authenticated message x=(xj)j=1N, xj{0,,q-1} to Alice. They perform the following steps.

  1. Bob sends x to Alice over a public, un-authenticated classical channel.

  2. For j{1,,N} Alice and Bob run the QR protocol, using the PUF labeled xj.

In each run j{1,,N}, Alice is convinced that someone with access to Bob’s PUF xj is returning her challenge states. By implication, the holder of Bob’s PUFs agrees with the message x which Alice received over the un-authenticated channel.

The security of this protocol trivially reduces to the security of the original QR protocol.

An alternative construction

The scheme in Sect. 3.1 requires Bob to essentially send the message x twice. This can be avoided, but at some cost. Consider the above protocol, but without step 1. Alice now does not know beforehand which PUF will be activated by Bob. Alice has to modify her verification equipment such that it can distinguish between q different authentic response states.

In the optical-PUF implementation, QSA [16], there is an elegant way to achieve this functionality (see Fig. 1). The configuration of the spatial light modulator (SLM) is modified so that each of the q correct wavefronts is transformed into its own single mode, which is then directed through a pinhole into a detector. (While incorrect response states are transformed to random speckle which typically does not lead to a detection event.) The price to pay is that the efficiency of the SLM transform is reduced by a factor q, i.e., photons are lost.

Fig. 1.

Fig. 1

A single SLM configuration can verify q distinct responses. Example for q=2

One may be tempted to think that our exclusion of step 1 now enables Bob to send secret information x to Alice. However, bear in mind that Bob is presenting his choice of PUF to the whole outside world; if an attacker briefly hijacks Alice’s optical path to Bob, the attacker too can have access to Bob’s PUF and determine xj.

Massively parallel QSA-d

We observe that there are two vastly different time scales in QSA. On the one hand, the preparation of an SLM and the photodetection takes a verifier at least 20 microseconds.4 On the other hand, the interaction between a challenge and the prover’s PUF lasts not much longer than the duration of the challenge pulse, some 10 picoseconds.

While one verifier is preparing his equipment for the next round, the prover has plenty of time to let other verifiers interact with his PUFs. This allows for a parallel implementation of QSA-d as shown in Fig. 2. The prover is a server that has to authenticate different messages x(1),x(2), to many different verifiers V1,V2,. For simplicity we consider q=2. Extension to q3 is straightforward. In time slot i the server presents PUF0 to n different verifiers v which have symbol xi(v)=0 and PUF1 to n verifiers v which have xi(v)=1. Each time slot is subdivided into smaller time intervals ti,1,,ti,n. Each verifier gets his own interval.

Fig. 2.

Fig. 2

Parallel QSA-d

The parallelism can be increased further if different wavelengths are included; challenges at different wavelengths can pass through a PUF simultaneously and can be routed independently.

In theory, the above-mentioned timescales would allow for an amount of parallelism n=20μs/10ps=2·106. In practice the bottleneck is the switching speed that can be realized using, e.g., electro-optical modulation. Currently the switching time is of the order of 1 ns. This yields n=20μs/1ns=2·104.

Authenticating quantum information

Consider the construction in Sect. 3.2 for q=2. Alice sends a random challenge state |ψ. Bob routs the challenge into PUF0 with probability amplitude α and into PUF1 with amplitude β. (|α|2+|β|2=1.) The response state is

αR0|ψ+βR1|ψ, 1

and this is sent to Alice. Alice’s verification equipment (Fig. 1) focuses the response through the ‘0’ pinhole with amplitude α and through the ‘1’ pinhole with amplitude β.

The upshot is (i) that Alice has received a qubit state with parameters α,β unknown to her (but known to Bob), and (ii) that Alice knows that this qubit state can be sent only by the holder of Bob’s PUFs. Thus, we have achieved PUF-based authentication of quantum states, with the restriction that the sender must know the quantum state.

As in Sect. 3.2, the data cannot be considered secret. An attacker could challenge Bob’s setup using a macroscopic amount of light, and the response would reveal α and β with high accuracy. Alice too could use a macroscopic amount of light to learn α,β, but then she cannot trust that the response is coming from Bob.

Note that the SLM-based construction has photon losses. For q=2 the loss is of order 50%. There are two ways to compensate for the losses. (a) Alice’s challenges are single-photon states. The process is repeated (with fresh random ψ) until a response makes it through the pinholes.

(b) Alice’s challenge consists of more than one photon, e.g., n photons in state |ψn or a weak laser pulse as in [16]. The number of photons is scaled such that with high probability at least one photon makes it through the pinholes. The security of the authentication is guaranteed as long as n (or the expected n) is small enough [26] compared to the number of modes.

Summary and discussion

QR as presented in [16, 25] remotely verifies the authenticity of a PUF, but does not authenticate messages. In this paper we have shown two ways to modify QR so that it can authenticate messages. Bob’s choice of PUF corresponds to a message symbol 0,1,,q-1 in a q-ary alphabet. In the first and simplest protocol, Bob first announces the message x so that Alice knows which PUF responses to expect. In the second protocol, Bob makes no announcement; Alice’s verification equipment needs to be able to handle more than one correct response. In the QSA implementation of the second protocol, the efficiency (number of photons reaching the detector) decreases as 1 / q.

The second protocol allows Bob to send an authenticated quantum state to Alice. At Alice’s side, anything that passes through the pinholes must originate from Bob. The state must be known to Bob, so that he can prepare the optical routing parameters.

QSA-d can be operated in a massively parallel way. The degree of parallelism depends on the ratio of a verifier’s time interval between challenge pulses and the prover’s time needed to switch optical paths. Parallel QSA-d has the potential to be much faster than cryptographic signing.

If Bob wants to authenticate a quantum state that is unknown to him, he has to adjust the optical routing using parameters α,β that are ‘hidden’ inside a qubit. Such a feat requires a beam splitter controlled by the (α,β) qubit, i.e., type of quantum gate or switch. This is a topic for future work.

It is interesting to compare QR-based authentication of quantum states to cryptographic authentication. Cryptographic authentication of a quantum message always requires encryption [1]. In our case the challenge state |ψ, which cannot be determined by the attacker, serves as a mask which hides α,β. In this respect the ψ can be considered to be an ‘encryption key’ in our quantum authentication scheme.

In the field of optical encryption [20] phase masks are a popular physical encryption device that can be secure under specific conditions [21]. However, in contrast to PUFs, a phase mask can be easily replicated.

One important use case for QR-d is that it can serve as an additional authentication factor on top of the classical cryptographic authentication in Quantum Key Distribution. QKD then has two-factor authentication, where the two factors are entirely different. Furthermore, if the classical authentication key gets stolen (which typically is not noticeable), Alice and Bob still have the PUF-based authentication. Theft of the PUF does not go unnoticed.

It is interesting to note that physical location can also be used as an authentication factor [9]. Here the security is based on the assumption that the adversary has access only to a limited number of EPR pairs. Location as a credential can be used in combination with QR-d.

Acknowledgements

Funding was provided by the ERC (Grant No. ERC 279248) and by the Netherlands Organisation for Scientific Research (NWO) through the Vici grant scheme.

Footnotes

1

For an introduction to post-quantum cryptography we refer to [2, 5].

2

For an overview on quantum cryptography and quantum communication in general see, e.g., [7, 14].

3

This is a security assumption referred to as physical unclonability. It cannot be mathematically proven. Whether the assumption holds or not depends on the technological state of the art.

4

The setup in [16] took much longer, but that was without any optimization for speed.

Part of this work was supported by the European Research Council (279248) and by NWO, The Netherlands Organisation for Scientific Research.

Contributor Information

Boris Škorić, Email: b.skoric@tue.nl.

Pepijn W. H. Pinkse, Email: p.w.h.pinkse@utwente.nl

Allard P. Mosk, Email: a.p.mosk@uu.nl

References

  • 1.Barnum, H., Crépeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: IEEE Symposium on Foundations of Computer Science, pp. 449–458, 2002. http://arxiv.org/abs/quant-ph/0205128 (2002)
  • 2.Barreto, P.S.L.M., Biasi, F.P., Dahab, R., Lopez-Hernandez, J.C., de Morais, E.M., Salina de Oliveira, A.D., Pereira, G.C.C.F., Ricardini, J.E.: A panorama of post-quantum cryptography. In: Koç, C.K. (ed.) Open Problems in Mathematics and Computational Science, pp. 387–439. Springer International Publishing, Switzerland, (2014)
  • 3.Bennett CH. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 1992;68(21):3121–3124. doi: 10.1103/PhysRevLett.68.3121. [DOI] [PubMed] [Google Scholar]
  • 4.Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984)
  • 5.Bernstein DJ, Buchmann J, Dahmen E. Post-Quantum Cryptography. Berlin: Springer; 2009. [Google Scholar]
  • 6.Bernstein, D.J., Hopwood, D., Hülsing, A., Lange, T., Niederhagen, R., Papachristodoulu, L., Schneider, M., Schwabe, P., Wilkox-O’Hearn., Z.: SPHINCS: practical stateless hash-based signatures. In: Oswald, E., Fischlin, M. (eds.) CRYPTO 2015, volume 9056 of LNCS, pp. 368–397. Springer Berlin Heidelberg (2015)
  • 7.Broadbent A, Schaffner C. Quantum cryptography beyond quantum key distribution. Des. Codes Cryptogr. 2016;78:351–382. doi: 10.1007/s10623-015-0157-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Bruß D, Macchiavello C. Optimal state estimation for d-dimensional quantum systems. Phys. Lett. A. 1999;253(5–6):249–251. doi: 10.1016/S0375-9601(99)00099-7. [DOI] [Google Scholar]
  • 9.Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. In: CRYPTO 2011, volume 6841 of LNCS, pp. 429–446. Springer (2011)
  • 10.Derka R, Bužek V, Ekert AK. Universal algorithm for optimal estimation of quantum states from finite ensembles via realizable generalized measurement. Phys. Rev. Lett. 1998;80:1571. doi: 10.1103/PhysRevLett.80.1571. [DOI] [Google Scholar]
  • 11.Dieks D. Communication by EPR devices. Phys. Lett. A. 1982;92:271–272. doi: 10.1016/0375-9601(82)90084-6. [DOI] [Google Scholar]
  • 12.Ekert AK. Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 1991;67:661–663. doi: 10.1103/PhysRevLett.67.661. [DOI] [PubMed] [Google Scholar]
  • 13.Gassend, B.: Physical random functions. Master’s thesis, Institute of Technology, Massachusetts, Jan (2003)
  • 14.Gisin N, Thew R. Quantum communication. Nature Photonics. 2007;1:165–171. doi: 10.1038/nphoton.2007.22. [DOI] [Google Scholar]
  • 15.Goodman JW. Laser Speckle and Related Phenomena, Chapter Statistical properties of laser speckle patterns. 2. New York: Springer; 1984. [Google Scholar]
  • 16.Goorden SA, Horstmann M, Mosk AP, Škorić B, Pinkse PWH. Quantum-secure authentication of a physical unclonable key. Optica. 2014;1(6):421–424. doi: 10.1364/OPTICA.1.000421. [DOI] [Google Scholar]
  • 17.Gottesman D, Preskill J. Secure quantum key distribution using squeezed states. Phys. Rev. A. 2001;63:022309. doi: 10.1103/PhysRevA.63.022309. [DOI] [Google Scholar]
  • 18.Hankerson D, Menezes AJ, Vanstone S. Guide to Elliptic Curve Cryptography. New York Inc: Springer-Verlag; 2004. [Google Scholar]
  • 19.Hillery M. Quantum cryptography with squeezed states. Phys. Rev. A. 2000;61:022309. doi: 10.1103/PhysRevA.61.022309. [DOI] [Google Scholar]
  • 20.Javidi B, et al. Roadmap on optical security. J. Opt. 2016;18(8):083001. doi: 10.1088/2040-8978/18/8/083001. [DOI] [Google Scholar]
  • 21.Markman A, Javidi B. Full-phase photon-counting double-random-phase encryption. J. Opt. Soc. Am. A. 2014;31(2):394–403. doi: 10.1364/JOSAA.31.000394. [DOI] [PubMed] [Google Scholar]
  • 22.Pappu R, Recht B, Taylor J, Gershenfeld N. Physical one-way functions. Science. 2002;297:2026–2030. doi: 10.1126/science.1074376. [DOI] [PubMed] [Google Scholar]
  • 23.Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature. 2014;509:475–478. doi: 10.1038/nature13303. [DOI] [PubMed] [Google Scholar]
  • 24.Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
  • 25.Škorić B. Quantum readout of physical unclonable functions. Int. J. Quantum Inf. 2012;10(1):1250001-1–1250001-31. [Google Scholar]
  • 26.Škorić B. Security analysis of quantum-readout PUFs in the case of challenge-estimation attacks. Quantum Inf. Comput. 2016;16:0050–0060. [Google Scholar]
  • 27.Škorić B, Mosk AP, Pinkse PWH. Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks. Int. J. Quantum Inf. 2013;11(4):1350041-1–1350041-15. [Google Scholar]
  • 28.Wootters WK, Zurek WH. A single quantum cannot be cloned. Nature. 1982;299:802–803. doi: 10.1038/299802a0. [DOI] [Google Scholar]

Articles from Quantum Information Processing are provided here courtesy of Springer

RESOURCES