Cargando…

Memristor-based PUF for lightweight cryptographic randomness

Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for s...

Descripción completa

Detalles Bibliográficos
Autores principales: Ibrahim, Hebatallah M., Abunahla, Heba, Mohammad, Baker, AlKhzaimi, Hoda
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9126908/
https://www.ncbi.nlm.nih.gov/pubmed/35606367
http://dx.doi.org/10.1038/s41598-022-11240-6
_version_ 1784712232880308224
author Ibrahim, Hebatallah M.
Abunahla, Heba
Mohammad, Baker
AlKhzaimi, Hoda
author_facet Ibrahim, Hebatallah M.
Abunahla, Heba
Mohammad, Baker
AlKhzaimi, Hoda
author_sort Ibrahim, Hebatallah M.
collection PubMed
description Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for security applications. The most popular PUF architectures are transistor-based and they focus on exploiting the uncontrollable process variations in conventional CMOS fabrication technology. Recent development in emerging technology such as memristor-based models provides an opportunity to achieve a robust and lightweight PUF architecture. Memristor-based PUF has proven to be more resilient to attacks such as hardware reverse engineering attacks. In this paper, we design a lightweight and low-cost memristor PUF and verify it against cryptographic randomness tests achieving a unique, reliable, irreversible random sequence output. The current research demonstrates the architecture of a low-cost, high endurance Cu/HfO[Formula: see text] Si memristor-based PUF (MR-PUF) which is compatible with advanced CMOS technologies. This paper explores the 15 NIST cryptographic randomness tests that have been applied to our Cu/HfO[Formula: see text] Si MR-PUF. Moreover, security properties such as uniformity, uniqueness, and repeatability of our MR-PUF have been tested in this paper and validated. Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST tests. Additionally, this paper investigated MR-PUF within a new authenticated key exchange and mutual authentication protocol between the head-end system (HES) and smart meters (SM)s in an advanced metering infrastructure (AMI) for smartgrids. The authenticated key exchange protocol utilized within the AMI was verified in this paper to meet the essential security when it comes to randomness by successfully passing the NIST tests without a post-processing algorithm.
format Online
Article
Text
id pubmed-9126908
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-91269082022-05-25 Memristor-based PUF for lightweight cryptographic randomness Ibrahim, Hebatallah M. Abunahla, Heba Mohammad, Baker AlKhzaimi, Hoda Sci Rep Article Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for security applications. The most popular PUF architectures are transistor-based and they focus on exploiting the uncontrollable process variations in conventional CMOS fabrication technology. Recent development in emerging technology such as memristor-based models provides an opportunity to achieve a robust and lightweight PUF architecture. Memristor-based PUF has proven to be more resilient to attacks such as hardware reverse engineering attacks. In this paper, we design a lightweight and low-cost memristor PUF and verify it against cryptographic randomness tests achieving a unique, reliable, irreversible random sequence output. The current research demonstrates the architecture of a low-cost, high endurance Cu/HfO[Formula: see text] Si memristor-based PUF (MR-PUF) which is compatible with advanced CMOS technologies. This paper explores the 15 NIST cryptographic randomness tests that have been applied to our Cu/HfO[Formula: see text] Si MR-PUF. Moreover, security properties such as uniformity, uniqueness, and repeatability of our MR-PUF have been tested in this paper and validated. Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST tests. Additionally, this paper investigated MR-PUF within a new authenticated key exchange and mutual authentication protocol between the head-end system (HES) and smart meters (SM)s in an advanced metering infrastructure (AMI) for smartgrids. The authenticated key exchange protocol utilized within the AMI was verified in this paper to meet the essential security when it comes to randomness by successfully passing the NIST tests without a post-processing algorithm. Nature Publishing Group UK 2022-05-23 /pmc/articles/PMC9126908/ /pubmed/35606367 http://dx.doi.org/10.1038/s41598-022-11240-6 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Ibrahim, Hebatallah M.
Abunahla, Heba
Mohammad, Baker
AlKhzaimi, Hoda
Memristor-based PUF for lightweight cryptographic randomness
title Memristor-based PUF for lightweight cryptographic randomness
title_full Memristor-based PUF for lightweight cryptographic randomness
title_fullStr Memristor-based PUF for lightweight cryptographic randomness
title_full_unstemmed Memristor-based PUF for lightweight cryptographic randomness
title_short Memristor-based PUF for lightweight cryptographic randomness
title_sort memristor-based puf for lightweight cryptographic randomness
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9126908/
https://www.ncbi.nlm.nih.gov/pubmed/35606367
http://dx.doi.org/10.1038/s41598-022-11240-6
work_keys_str_mv AT ibrahimhebatallahm memristorbasedpufforlightweightcryptographicrandomness
AT abunahlaheba memristorbasedpufforlightweightcryptographicrandomness
AT mohammadbaker memristorbasedpufforlightweightcryptographicrandomness
AT alkhzaimihoda memristorbasedpufforlightweightcryptographicrandomness