Cargando…
Memristor-based PUF for lightweight cryptographic randomness
Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for s...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9126908/ https://www.ncbi.nlm.nih.gov/pubmed/35606367 http://dx.doi.org/10.1038/s41598-022-11240-6 |
_version_ | 1784712232880308224 |
---|---|
author | Ibrahim, Hebatallah M. Abunahla, Heba Mohammad, Baker AlKhzaimi, Hoda |
author_facet | Ibrahim, Hebatallah M. Abunahla, Heba Mohammad, Baker AlKhzaimi, Hoda |
author_sort | Ibrahim, Hebatallah M. |
collection | PubMed |
description | Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for security applications. The most popular PUF architectures are transistor-based and they focus on exploiting the uncontrollable process variations in conventional CMOS fabrication technology. Recent development in emerging technology such as memristor-based models provides an opportunity to achieve a robust and lightweight PUF architecture. Memristor-based PUF has proven to be more resilient to attacks such as hardware reverse engineering attacks. In this paper, we design a lightweight and low-cost memristor PUF and verify it against cryptographic randomness tests achieving a unique, reliable, irreversible random sequence output. The current research demonstrates the architecture of a low-cost, high endurance Cu/HfO[Formula: see text] Si memristor-based PUF (MR-PUF) which is compatible with advanced CMOS technologies. This paper explores the 15 NIST cryptographic randomness tests that have been applied to our Cu/HfO[Formula: see text] Si MR-PUF. Moreover, security properties such as uniformity, uniqueness, and repeatability of our MR-PUF have been tested in this paper and validated. Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST tests. Additionally, this paper investigated MR-PUF within a new authenticated key exchange and mutual authentication protocol between the head-end system (HES) and smart meters (SM)s in an advanced metering infrastructure (AMI) for smartgrids. The authenticated key exchange protocol utilized within the AMI was verified in this paper to meet the essential security when it comes to randomness by successfully passing the NIST tests without a post-processing algorithm. |
format | Online Article Text |
id | pubmed-9126908 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-91269082022-05-25 Memristor-based PUF for lightweight cryptographic randomness Ibrahim, Hebatallah M. Abunahla, Heba Mohammad, Baker AlKhzaimi, Hoda Sci Rep Article Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for security applications. The most popular PUF architectures are transistor-based and they focus on exploiting the uncontrollable process variations in conventional CMOS fabrication technology. Recent development in emerging technology such as memristor-based models provides an opportunity to achieve a robust and lightweight PUF architecture. Memristor-based PUF has proven to be more resilient to attacks such as hardware reverse engineering attacks. In this paper, we design a lightweight and low-cost memristor PUF and verify it against cryptographic randomness tests achieving a unique, reliable, irreversible random sequence output. The current research demonstrates the architecture of a low-cost, high endurance Cu/HfO[Formula: see text] Si memristor-based PUF (MR-PUF) which is compatible with advanced CMOS technologies. This paper explores the 15 NIST cryptographic randomness tests that have been applied to our Cu/HfO[Formula: see text] Si MR-PUF. Moreover, security properties such as uniformity, uniqueness, and repeatability of our MR-PUF have been tested in this paper and validated. Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST tests. Additionally, this paper investigated MR-PUF within a new authenticated key exchange and mutual authentication protocol between the head-end system (HES) and smart meters (SM)s in an advanced metering infrastructure (AMI) for smartgrids. The authenticated key exchange protocol utilized within the AMI was verified in this paper to meet the essential security when it comes to randomness by successfully passing the NIST tests without a post-processing algorithm. Nature Publishing Group UK 2022-05-23 /pmc/articles/PMC9126908/ /pubmed/35606367 http://dx.doi.org/10.1038/s41598-022-11240-6 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Ibrahim, Hebatallah M. Abunahla, Heba Mohammad, Baker AlKhzaimi, Hoda Memristor-based PUF for lightweight cryptographic randomness |
title | Memristor-based PUF for lightweight cryptographic randomness |
title_full | Memristor-based PUF for lightweight cryptographic randomness |
title_fullStr | Memristor-based PUF for lightweight cryptographic randomness |
title_full_unstemmed | Memristor-based PUF for lightweight cryptographic randomness |
title_short | Memristor-based PUF for lightweight cryptographic randomness |
title_sort | memristor-based puf for lightweight cryptographic randomness |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9126908/ https://www.ncbi.nlm.nih.gov/pubmed/35606367 http://dx.doi.org/10.1038/s41598-022-11240-6 |
work_keys_str_mv | AT ibrahimhebatallahm memristorbasedpufforlightweightcryptographicrandomness AT abunahlaheba memristorbasedpufforlightweightcryptographicrandomness AT mohammadbaker memristorbasedpufforlightweightcryptographicrandomness AT alkhzaimihoda memristorbasedpufforlightweightcryptographicrandomness |