2020
DOI: 10.1109/jeds.2020.3019266
|View full text |Cite
|
Sign up to set email alerts
|

A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory

Abstract: Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher area efficiency. In this work, a novel tri-functional module is proposed and experimental demonstrated using RRAM for the first time. A two-phase forming process is designed to generate and store PUF ID utilizing the impact of different forming conditions on the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…[194] Recently privacy-preserving mutual authentication scheme shown in Figure 16 is also gaining attention. [157,196,197] This implementation requires both TRNG and PUF and hence, often explored as a unified design. Here, the server generates a random string R1 through its TRNG and encrypts it with the secret PUF secret ID and transmits it to the device.…”
Section: Physical Unclonable Function In Cryptographic Applicationsmentioning
confidence: 99%
“…[194] Recently privacy-preserving mutual authentication scheme shown in Figure 16 is also gaining attention. [157,196,197] This implementation requires both TRNG and PUF and hence, often explored as a unified design. Here, the server generates a random string R1 through its TRNG and encrypts it with the secret PUF secret ID and transmits it to the device.…”
Section: Physical Unclonable Function In Cryptographic Applicationsmentioning
confidence: 99%
“…Moreover, the inherent variability of RRAMs, due to the stochastic nature of their switching mechanism [13], has positioned these devices as one of the most competitive candidates for the development of security primitives [14]. In fact, RRAMs have attracted the attention of the research community for the implementation of PUFs [15][16][17][18][19][20][21][22][23] and true random number generators (TRNGs) [24][25][26][27][28][29]. Nevertheless, RRAM-based circuits may also introduce security vulnerabilities of their own.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, implementing hardware-based primitives into software-based encryption algorithms could be more reliable for next-generation security applications. Among various hardware candidates, emerging memristive devices with the inherent variability of their electrical parameters could be an option for a true random number generator (TRNG). The memristive devices are being studied for a wide range of applications, including storage, in-memory logic computing, and neuromorphic computing . Toward practical applications, the intrinsic stochastic cycle-to-cycle (C2C) variability, such as the random telegraph noise (RTN) and nonuniform switching voltages, could be one of the primary concerns .…”
mentioning
confidence: 99%