Abstract
Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications. Thus, the PUF output (response) has properties that can be utilized in building a true random number generator (TRNG) for security applications. The most popular PUF architectures are transistor-based and they focus on exploiting the uncontrollable process variations in conventional CMOS fabrication technology. Recent development in emerging technology such as memristor-based models provides an opportunity to achieve a robust and lightweight PUF architecture. Memristor-based PUF has proven to be more resilient to attacks such as hardware reverse engineering attacks. In this paper, we design a lightweight and low-cost memristor PUF and verify it against cryptographic randomness tests achieving a unique, reliable, irreversible random sequence output. The current research demonstrates the architecture of a low-cost, high endurance Cu/HfO\(_2/p^{++}\)Si memristor-based PUF (MR-PUF) which is compatible with advanced CMOS technologies. This paper explores the 15 NIST cryptographic randomness tests that have been applied to our Cu/HfO\(_2/p^{++}\)Si MR-PUF. Moreover, security properties such as uniformity, uniqueness, and repeatability of our MR-PUF have been tested in this paper and validated. Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST tests. Additionally, this paper investigated MR-PUF within a new authenticated key exchange and mutual authentication protocol between the head-end system (HES) and smart meters (SM)s in an advanced metering infrastructure (AMI) for smartgrids. The authenticated key exchange protocol utilized within the AMI was verified in this paper to meet the essential security when it comes to randomness by successfully passing the NIST tests without a post-processing algorithm.
Similar content being viewed by others
Introduction
Cryptographic Randomness is an essential property to maintain when it comes to building confidentiality, authentication and integrity-focused primitives, and security solutions. For example for encryption primitives, random numbers are used in both symmetric and asymmetric encryption algorithms to generate initial values, nonces, cryptographic keys, and round constants among other purposes1.
Thus, random number generators (RNG) are an important resource in many areas, yet producing random numbers is challenging as selecting a specific source of randomness governs the quality, security, and robustness of the resulting output. For example, it is important to understand whether the random number generator is non-deterministic (True) RNG or the deterministic (Pseudo) RNG2. The difference is significant, since, by definition, the output of a true random generator cannot be tampered with, whereas Pseudo random generators produce a sequence of numbers that can be reproduced at a later date if the starting point in the sequence is known3. Today, true random numbers are most critically required in cryptography and its numerous applications to cyber-security, especially interactive lightweight focused systems, such as Smart Energy Grid, e-banking, internet trade, prepaid cards, etc.
Cryptographic material, such as Digital keys, are conventionally saved in memories for cryptographic applications. However, digital memories are at risk of physical attacks. Complex and costly tamper-proofing mechanisms have to be implemented in hardware to secure these cryptographic materials. In 2001 Pappu4 proposed physical one-way functions, known as PUFs nowadays, to act as refined primitives to generate true intrinsic randomness which is critical for cryptographic applications. The properties generated can be used to enhance the security characteristics of applications by providing better confidentiality and authentication attributes through enhancing randomness. More importantly, they are less complex to fabricate, inexpensive, particularly difficult to duplicate, admit no compact mathematical representation to be reversed, and they do not need to be saved on memory, thus, they are more resistant to physical attacks. The Physical Unclonable function we propose in this paper is a lightweight, efficient, unique, robust, and uniform low cost security primitive, which exploits the intrinsic variation of the delay time as the source of randomness to build a TRNG unit that employs our HfO\(_{2-x}\) memristor only. Memristor devices are considered low power devices due to their zero-leakage current and low switching time. Thus, memristor-based PUFs are considered low energy systems compared to conventional CMOS-based PUFs5. Previous work proposed on Memristor-based PUFs has proposed several models verifying the efficiency through demonstrating different cryptographic randomness tests such as uniformity, uniqueness, diffuseness, and repeatability. However, few were able to be pass the national institute of standards and technology (NIST) tests. Others couldnât avoid a complex design and didnât consider the cost factor. Also, few verified the functionality and reliability of their proposed PUF in actual systems or protocols.
In our paper, the main contributions can be summarized as follows: (a) We propose a simple design, low-cost, reliable memristor based PUF (MR-PUF) that successfully achieved true random binary sequence. (b) Additionally, our MR-PUF responses were tested using NIST SP 800-22 statistical tests and other cryptographic randomness tests to verify its true randomness properties. (c) Furthermore, we introduced two different cryptographic and security level applications of the proposed MR-PUF. We were able to verify the reliability and randomness of our MR-PUF through integrating it in two applications block-cipher design and advanced metering infrastructure (AMI). (d) Finally, we have introduced general testing mechanisms and simulations to the application proposed.
In this paper, we start by presenting the PUFs background in the coming section, as well as the limitation of memristor-based PUFs presented in the literature review and some compilation of cryptographic randomness tests in. Then explain the memristor performance and functionality through discussing the switching behavior in and demonstrate our proposed memristor model fabrication process and its switching behavior. After that we verify the randomness of our MR-PUF in section using NIST tests and verifying the output uniformity, diffuseness, uniqueness tests, and repeatiability. Finally, we verify the feasibility and reliability of our MR-PUF in two systems, block-ciphers chain model to generate randomness and AMI model to enhance the security of the mutual authentication protocol. Then, conclude with the conclusion and future work.
Background
In applications where security is essential such as communication protocols TLS/SSL/HTTPS, contactless smartcards, e-banking, internet trade, etc, they require lightweight, secure and efficient cryptographic primitives to create a secure communication regardless of any malicious presence. For example, the key generation module is considered one of the most critical parts of the encryption crypto-system where keys are created using random number generators (RNGs). The two commonly known categories for the RNGs are deterministic (Pseduo-Random) RNGs and unpredictable (True) RNGs as shown in Table 1. Several Pseudo random techniques are supported by theories and have produced very good results. However, Pseudo RNGs are algorithms that use mathematical formulas or simply precalculated tables to produce sequences of numbers that appear random. However, they can be tampered with using the preceding outputs or the initial state (seed), by definition such generators are not random. Realistically, PRNGâs feature a perfect balance between 0âs and 1âs (zero bias) but also strong long-range correlations which undermine cryptographic strength and can show up as unexpected errors in Monte Carlo calculations and modeling6.
To ensure the security of the cryptographic primitives we need to ensure that the randomness source is truly random otherwise the whole system will collapse. True random number generators (TRNGs) are required to ensure the security of crypto-systems. TRNGs extract randomness from physical phenomena, the physical phenomenon used is a quantum phenomenon or a phenomenon with chaotic behavior (such as memristors and silicon cavities). The challenge is to retain the TRNG cryptographic characteristics, there have been many proposals in the literature that can be considered realistic in specific terms based on the time and memory complexity of the attacks that can be implemented to compromise the proposed characteristics. Hardware solutions as explained in the paper, are considered one of the most yet unrefined proposed solutions to get closer to implementing practical TRNGs. There are several examples of the hardware PUFs in the literature that have been built in lab. However, the unique approach of our MR-PUF is that we have fabricated the chemical characteristics of the PUF in the lab in order to obtain ideal cryptographic results as illustrated in the tests we have produced in the paper.
There are several metrics to evaluate PUF performance. Randomness, uniqueness, and uniformity are the three most-used metrics among them7. PUFs exploit the intrinsic quantum complexity and uniqueness of physical systems to generate secure random signatures.
Physical unclonable functions (PUFs)
PUFs extract unique sequences from unpredictable and uncontrollable process variations during IC manufacturing. The digital keys are confidential within its structure. Any invasive or semi-invasive attack will destroy the chipâs physical structure. A major advantage of PUFs is that they are easy and inexpensive to be built but impossible to duplicate because they rely on uncontrollable physical parameter variations that occur during the hardware device manufacture8. Most importantly, the PUF signature is only derived from the intrinsic complexity of the physical device when it is needed and vanishes otherwise, every time a given challenge (input) is presented to a PUF, a corresponding response (output) is given. Therefore, there is no need for digital memories, which makes PUFs invulnerable to hardware attacks. This response generated by a PUF is based on a complex physical function that is unique to each PUF. If a given challenge is given to several PUFs with the same design, different responses will be produced. The challenge and its corresponding response are called (CRP). A set of CRPs can be treated as a fingerprint of the PUF9.
Traditional PUFs are CMOS-based such as Arbiter PUF (APUF)9, Ring Oscillator PUF (ROPUF)10, SRAM (Static Random Access Memory) PUF11. They exploit uncontrollable process variations in conventional CMOS fabrication technology. CMOS-based PUF can produce chip-unique signature based on the intrinsic variations, that varies randomly from one chip to another12. Due to fabrication variations, there are random delay differences on symmetrical electrical paths on a chip. The randomness of the delays is sufficient to ensure a unique PUF response for each individual device instance13. These variations are translated into bits of information unique to each device. These bits can be employed in different categories of security protocols, such as secret keys, public keys authentications14, RFID tags15, IP protections16, IC piracy17, unique identifiers and pseudo random generators18.
Generally, there are two main applications of PUFs which are authentication and secure key generation. Based on the two applications, the PUFs are generally categorized as âstrong PUFsâ and âweak PUFsâ. Strong PUFs can be targeted for authentication, while weak PUFs are more fit for the key generation.
-
Strong PUFs are chaotic physical units with a complex challenge-response behavior characterized by large (CRPs)19. It is impossible to physically clone a strong PUF and impossible to measure or determine all the CRPs for a strong PUF within a limited time. Typical examples for the strong PUFs are: the arbiter PUF9 and the ring oscillator (RO) PUF10 as shown in Table 2. In contrast to the strong PUFs, the weak PUFs may have very few CRPs.
-
Weak PUFs can be considered as a distinctive form of memory, however, they are more resilient to invasive attacks than the non-volatile memory like EEPROM20. The most typical weak PUFs are the memory-based PUFs: SRAM PUF21, latch PUF22, and butterfly PUF23.
Current PUF designs face several challenges, such as extensive CRP access attacks to PUFs that acquire a limited number of CRPs, model building attacks19, reliability deterioration due to environmental conditions that are rarely due to aging24. Therefore, the design of superior PUFs that maintains a suitable trade-off between quality and area overhead, remains a research aim. Most recent PUF technologies are discussed in literature to mitigate some of the overhead and performance-related shortcomings.
Here in this paper, we exploit the unique properties of Nano-electronics rather than CMOS technology to provide an opportunity for building a PUF design that addresses the limited number of CRPs, model building attacks, reliability deterioration, and less utilization area. More importantly, achieving uniqueness, uniformity, irreversibility, and low cost which are critical for security25. Memristor PUFs have proven to be more resilient to attacks such as reverse engineering26. Several studies have been proposing memristor PUFs due to the inherent randomness at both the memristor level, due to the C2C programming variation of the device, and the fabrication process level such as the cross-sectional area and variations. It is clear that the generated characteristics are not identical which allows extracting unique keys, thus, the user will not be able to control its resistance. Leveraging this phenomenon, our MR-PUF can achieve a unique, reliable, irreversible PUF signature27.
Limitations of previously proposed memristor design for hardware security
In this section, we are revisiting similar designs available in the literature and drawing on the added value that our research is highlighting.
The design for a memristor-based (TRNG) has been discussed in literature and some designs have been tested the several NIST statistical randomness tests. However, not all have proven to pass all the 15 NIST tests. In28 the author proposed a memristive read and write PUF. Two Al/CUxO/Cu devices were implemented, they demonstrated lateral switching wherein, one of the two devices became fixed in an LRS state. No further tests were applied to the other working device. In29 the author continued the work on28 and presented N-bit read and write Memristive PUF (M-PUF) and verified its efficiency through demonstrating the uniqueness, uniformity, and bit-aliasing to measure the statistical quality of the M-PUF. Hybrid memristor-CMOS PUF circuits is proposed in30, benefiting in less design overhead than CMOS-only PUFs. They exploited the delay variation in the memristor devices to generate instance-specific signatures. They tested the reliability, uniqueness, and uniformity of the different sized PUFs. The authors also tested the reliability of the PUFs under different temperatures and voltages. However, they did not ensure its randomness and applied the 15 NIST tests. In26, the authors introduced a re-configurable PUF (rPUF) without additional hardware. rPUFs are needed for application required revocation or updated secure key. The author demonstrated the efficiency and security of their PUFs by demonstrating the uniqueness, reliability and a large number of challenge-response pairs (CRPs) through exploiting large information density available in nanocrossbar architectures. Memristors, or resistive switching devices, have been presented for a broad spectrum of applications because of their unique properties, such as low power consumption, fast switching speed, high endurance, excellent scalability, and CMOS compatibility. For non-volatile memories, the intrinsic variation in memristor switching parameters is a major challenge. However, this random behavior can be exploited in stochastic computing and hardware security applications. The author in31 exploited the randomness of the telegraph noise (RTN) from the low resistance state of a W/TiN/TiON/SiO\(_2\)/Si memristor. The resulting circuit demonstrated that the probabilities of â0â and â1â were highly dependent on the applied voltages, thus, the circuit is challenging to activate and control.
In32, the authors proposed a TRNG based on Cu/AlO\(_x\) and Ti/HfO\(_x\) memristors, using cycle to cycle (C2C) and device to device voltage variations. The proposed memristive devices were non-volatile, requiring SET-RESET pulses for each output bit, and careful tuning of the applied voltage. None of the previous memristor-based TRNGs passed all the 15 NIST 800-22 statistical randomness tests even with post-processing of data, leaving the claimed true nature of the randomness debatable. In 2016, the authors of33 demonstrated a TRNG that passed the 15 NIST tests using randomness from a small current fluctuation at certain resistance states in TaO\(_x\)-based devices. However, complicated algorithms and costly circuits were needed to ensure the quality of generated binary bits. In 2017, Pt/Ag/Ag:SiO\(_2\)/Pt memristor device was presented in34, the authors verified their TRNG Diffusive memristor (D-Memristor) by passing the 15 NIST test without the need for post-processing algorithm. However, the authors used five stacked layers consisting of Pt/Au/Ag/SiO\(_2\)/Pt presenting a complex structure compared to the three layers used in our work. This leads to a higher cost due to the increased material amount and the number of fabrication steps of the device. Also, the device in34 includes Au, Ag and Pt, which have higher cost compared to the copper electrodes used in our device. Thus, the device proposed in34 has a complex structure and higher cost. The security or practicality limitations of the previous proposed PUFs in terms of the number of NIST 800-22 tests that have been passed is summarized in Table 3. The memristor we propose in this paper is an efficient, unique, robust and uniform low cost security primitive. The Cu/HfO\(_{2-x}/p^{++}\)Si devices are fabricated using a low-cost solâgel spin-coating method. It is based on HfO\(_{2-x}\) which is compatible with advanced CMOS technologies and have high endurance. Moreover, the fine fabrication (in nm) of the HfO\(_{2-x}\) layer as a switching medium provide fast switching speed. The authors in35 proposed Resistive RAM (RRAM) TRNG based on HfO\(_{2-x}\). However, their security design only passed 12 tests out of the standard 15 NIST tests. In our design, we used the intrinsic variations of the delay time as the source of randomness to build a TRNG device. Binary bit sequences generated by our proposed MR-PUF passed all the 15 NIST Special Publication 800-22 randomness tests without any additional algorithms ensuring the enhanced security our design provides. Additionally, Cu/HfO\(_{2-x}/p^{++}\)Si MR-PUF is a cost-efficient approach to further improve the bit generation randomness and have never been exploited in literature, to the best of our knowledge.
Cryptographic randomness testing
The quality of the random numbers for a cryptographic system evaluates the security strength of the system. The randomness is measured by using tests suited for evaluating true random bit generators intended for cryptographic applications. Most randomness tests evaluate one or more statistical properties of long sequences of random numbers, for example, bias, serial auto-correlation etc6. Some compilation of tests are more adjusted towards problems in PRNGâs (eg. DIEHARD36) some more to hardware RNGâs (eg. ENT37). The unfortunate fact is that these tests contain errors discovered later38,39. NIST 800-2240 is a package of 15 tests that were formulated to evaluate the randomness of bit sequences produced by either hardware or software cryptographic systems. NIST 800-2240 doesnât offer guidance on how to implement TRNG or how to pass the tests, nonetheless, passing the 15 NIST 800-22 tests is vital for commercial use. In this section, we will investigate the NIST 800-22 testing map that we will use to test our TRNG. NIST40 is a set of statistical tests that are formulated to test a specific null hypothesis (H0). The H0 under test is that the sequence being tested is random. Corresponding with the null hypothesis is the alternative hypothesis (Ha), which points that the sequence is not random. For each applied test, a conclusion is derived that supports or rejects the null hypothesis, thus evaluating whether the generator is producing random values or not.
The NIST Statistical Test Suite (Special Publication 800-22)40 contains 15 tests that evaluates the randomness of a binary sequence and each test targets a specific aspect of parameters. As per NIST 800-22 the fail and pass threshold are formally defined within the P values that we have used across the security analysis to define the success and the failure of the tests as depicted in the paper. The \(\alpha\) which is the level of significance is one of the most important parameters in the test. If \(\alpha\) is 0 that means that the randomness of numbers to be tested has a confidence value of 99%. Another vital parameter is the p value and it is the measure of randomness. If this value is equal to 1, numbers are said to have perfect randomness. If p value is less than 0.01, numbers are not random. Thus, the bits sequence is considered to be random if and only if the P value \(\ge\) 0.01 and the pass rate exceeds the minimum pass rate for each test. In summary, for a fixed significance level or threshold a specific representation of P values will indicate a failure. For example, if the significance level is chosen to be 0.01 (i.e., = 0.01), then about 1% of the sequences are expected to fail. This indicates that a sequence passes a statistical test if the P value \(\ge\) 0.01 and fails otherwise.
Memristor model
In this section, we are introducing the details of the hardware design of the memristor that we have fabricated and discussing its unique hardware properties. A clear advantage of Memristor PUFs is the reduction in area utilization and the low energy consumption compared to CMOS-based PUFs. Our memristor based on HfO\(_{2-x}\) as a switching medium is a favorable candidate given that HfO\(_{2-x}\) provides high endurance due to the materialâs high stability41. We have utilized sets of cycles to generate a random sequence and perform the one million bit tests. This device has high endurance and acquire fast switching speed due to the fine thickness (in nm) of the deposited HfO\(_2\) layer. Additionally, our HfO\(_{2-x}\) based memristor is compatible with advanced CMOS technologies, has a low cost and a simple synthesis process due to the only three stacked layers used in the fabrication process.
Furthermore, the memristor has a unique phenomenon that can achieve the uniqueness, irreversibility, and reliability required for efficient PUF designs called cycle-to-cycle (C2C) variation, meaning that every time the memristor cell gives different resistance than the previous time; depending on the previous current that passed through the cell. Thus, memristors have inherent randomness at both the memristor device level due to the C2C characteristic and the intrinsic variations of the device fabrication process level (such as thickness and cross-sectional area variations). Memristor-based TRNG can be used in numerous algorithms and protocols which use random numbers for the construction of encryption and decryption keys, initialization vectors, one time passwords, padding, nonces, and many more applications. In this paper, we integrated MR-PUF in AMI infrastructure and ciphers design to ensure the reliability of our proposed MR-PUF in different applications. The design for a memristor-based true random number generator (TRNG) has been discussed in literature26,27,28,30 and some designs have been tested by several statistical randomness tests designed by NIST. However, not all have proven to pass the NIST 15 tests.
Switching behavior
Figure 1 illustrates the operation principles of our MR-PUF. The concentration gradient of ions that can be moved back and forth using an applied electric field are the SET and RESET switching phases26 . The memristive device switches from HRS (High Resistance State) to LRS (Low Resistance State) with a positive potential difference between the bottom electrode and top electrode corresponding to SET switching. It switches from LRS to HRS with a negative potential difference between the bottom electrode and top electrode corresponding to RESET switching. When a memristive unit is programmed its memristance does not change even if its power supply is out except if a voltage higher than the threshold voltage is applied across the device26.
In Fig. 2, the electrical behavior of the fabricated MR-PUF is investigated to understand the switching mechanism of the device. The device starts with a high resistance state, and under the application of +3 V voltage bias, as shown in Fig. 2, a sharp jump in the current occurs at 2.5 V until it reaches the compliance current of 100 \(\upmu\)A. This operation is called SET, where one or more filaments are created to allow the current to pass through the device. A low compliance current is essential to reduce the power consumed by the device and to avoid reaching extremely high current levels which may permanently put the device in the low resistance state. To reset the memristor, -1 V is applied as shown in Fig. 2, and the compliance current is increased to allow a higher current to pass through the device. From Figs. 1 and 2, it can be depicted that the fabricated devices exhibit electrochemical metallization (ECM) switching behavior, in which the creation of the conductive filaments is achieved by the ion migration resulted from the high electric field generated in the device. Moreover, during RESET operation, a synergic effect of joule heating takes place by allowing higher current to pass through the device and consequently achieving faster OFF switching for the memristor.
Description of the memristor model and its fabrication process
The Cu/HfO\(_{2-x}/p^{++}\)Si device shown in Fig. 3 is fabricated in our lab using a low-cost solâgel spin-coating method. Briefly, HfO\(_{2-x}\) solâgel solution is prepared by mixing hafnium isopropoxide isopropanol adduct (0.99 purity) with sulfuric acid, deionized water (DI), 2-methoxiethanol and polyvinylpyrrolidone (PVP). Contents are mixed between the addition of each new component and the HfO\(_{2-x}\) precursor solution is left to stir overnight for PVP to dissolve. Ready HfO\(_{2-x}\) solution is spin-coated on a heavily doped, \(p^{++}\)Si substrate pieces. Further, the sample is heat-treated in order to remove the organic residues from the oxide layer, originating mainly from the PVP. After heat treatment, a shadow mask sputtering step was performed to deposit Cu TEs using Q300T T sputtering tool by Quorum Technologies. Our memristor is cost-effective as it is based on thin film which uses spin coating for oxide deposition and only one metal deposition step. Usually, three deposition steps are needed to achieve a memristor stack; one for the bottom electrode, then the second is for the oxide layer and the third is for the top electrode. However, in this novel structure, the silicon wafer is utilized to act as a bottom electrode which eliminates one fabrication step and consequently results in a cost-effective device. Moreover, this device is compatible with mainstream CMOS technology and does not require any new materials nor masks. This lowers the cost of fabricating this device. The thickness of the deposited HfO\(_2\) layer is in the range of nm (\(\sim\) 150 nm) which leads to fast switching time in ns. This is considered great asset for high-speed Memristor-based PUFs. The scanning electron micros-copy (SEM) images that confirm the nm size of the used memristor device is shown in Fig. 4. The power consumption of the our proposed MR-PUF on average is 100 \(\upmu\)W. Note that the power consumption varies based on the used voltage set cycles in each iteration.
Keithley 4200-SCS Parameter Analyzer was used in the characterization of the IâV properties of the fabricated devices, no prior electro-forming was performed. The prepared memristors were electrically tested using a sweep cycling mode with a step of 0.05 V. \(+\,3\) V and \(-\,1\) V was applied onto the Cu electrode to set and reset the device, respectively.
The Memristor is highly nonlinear in voltage and time which makes it effective for security applications. The nonlinear mathematical model presented in Eq. (1) describes the behavior of memristive devices. The different parameters are defined as follows. \(J_V\)(x) is the current density at position x. \(Q_v\) is the charge of oxide vacancy. \(U_a\) is the activation energy of the ions. f is the escape attempt frequency. a is the hopping distance. V is the voltage applied across the memristor. \(N_V(x)\) is the concentration of oxide vacancies at position x. \(\alpha\) is a fitting parameter. \(k_\beta\) is Boltzmann constant. T is the ambient temperature. L is the length of the memristor. t is the time duration of the applied voltage42.
Proposed memristor unique switching behavior
Depending on the material composition and the followed fabrication process, the filamentary-based switching mechanism can be highly probabilistic and uncontrolled which attributes to the final random sequence. Figure 5 presents consecutive IâV curves obtained by applying the same voltage sweep across the same memristor device. The data presented in Fig. 5 has been recorded in consecutive manners. However, some intermediate cycles are not shown for clarity and better readability of the figure.
The results shown in Fig. 5 are based on experimental data extracted from the wafer shown in Fig. 3. The stochastic behavior of the switching taking place in memristor devices is utilized in this contribution as the entropy source to generate the random output. The entropy source is inherited from the device ionic behavior that contributes to the device resistance switching43,44, in addition to the fabrication variations. Based on these factors, the memristor devices exhibit random variations in the fingerprint IâV characteristics from device to device, and from cycle to cycle within the same memristor cell. Although this is undesirable for memory, within computing and sensing applications, it is considered a desirable randomness asset for hardware-based security schemes45,46,47. Thus, in this work actual memristor devices are fabricated and the extracted switching parameters are used as the randomness source for the proposed security approach.
Additionally, the uniqueness property can be verified by generating random sequences from identical memristor devices and calculating the inter-HD. As depicted in Fig. 6, although the memristors are fabricated on the same wafer using the same device features and material compositions, each device has its own unique output to the same challenge which leads to a distinguished true random bit sequence. More importantly, Fig. 7 presents the high endurance of our fabricated memristor which is related to the used HfO\(_{2}\) material as a switching medium. This is consistent with many HfO\(_{2}\)-based memristors that are reported in literature41.
Exploiting randomness from memristor switching behavior
This section investigates our testing algorithms for the fabricated MR-PUF. The random output generated is attributed to the set and reset operations of the fabricated MR-PUF to generate random responses. The natural variations in non-linear I-V curves, with the possibility of using voltage bias as a challenge (independent input bits), results in diversity restructuring sneak path currents providing random current values (Response). For every voltage in Figs. 5 and 6, there is a corresponding current and is different in every cycle ensuring the randomness of our responses. The initial random outputs are captured by our proposed MR by using Keithley 4200-SCS parameter analyzer by applying fluctuating voltages to the fabricated device. In parallel, using Keithley 4200-SCS Parameter Analyzer, we used a MATLAB model to record the output and test our MR-PUF signature using NIST statistical tests. Our MR-PUF passed the 15 NIST tests without any post-processing as shown in Table 4. In each test, the P value is given where the P value is the probability that a perfect random number generator would have produced a sequence less random than the sequence that was tested. P value \(>\,0.01\) would mean that the sequence would be considered to be 99% random. On the other hand, a P Value \(<\,0.01\) would mean that the sequence is 99% non-random.
Randomness testing results
This property ensures the uniqueness of the PUF output. The PUF response must be unique, thus the probability for two devices having a similar PUF response is negligible. Each PUF response must be random and unpredictable.
For each input pulse to our TRNG MR-PUF , up to 32 random binary bits response can be collected. According to the NIST test protocol, 1M bits is collected and tested. Our TRNG MR-PUFâs response bits successfully passed the 15 NIST tests with a P value is greater than 0.01 and the pass rate exceeds the minimum value defined by NIST. The P value of the tests carried out are shown in Table 4. To further demonstrate the randomness of our MR-PUF, we compared the P values of the NIST Statistical results achieved by our MR-PUF with the NIST P value results of the Memristors presented in literature31,34 in Table 5.
Uniformity, diffuseness and uniqueness
We further assessed the randomness of our TRNG memristor PUF through evaluating vital standard metrics of randomness and reliability in cryptographic security primitives such as inter and intra-instance Hamming weight and Hamming distance. Uniformity is the measure of intra-response Hamming weight, and diffuseness is the measure of intra-PUF Hamming distance. These metrics evaluate the randomness of each PUF instance. Another important metric is uniqueness, which is the inter-PUF Hamming distance between responses to identical challenges to different PUFs. In order to evaluate uniformity and diffuseness, 100 different challenge sets are randomly applied to one MR-PUF. Each challenge consisting of \(2^7\) bits, the \(2^7\) single response bits are linked to form a 128 multiple bits response.
Uniformity
Uniformity measures the percentage of â1â and â0â in responses of a PUF. Uniformity is achieved if the percentage is 50% for a truly random response. For our study, 100 different 128 bit challenges are send to one of our MR-PUFs and each 128 bits response vector acts as an identifier (ID) of a given MR-PUF. To evaluate the uniformity of our MR-PUF the percentage of â1â and â0â among all response vectors is calculated and illustrated in Fig. 8. From Fig. 8, it can be seen that both the probability of â0â and â1â are 48.9% and 51.1% respectively. Which is near to the ideal value of 50%. We carried out a comparison between our MR-PUF, R/W memristor29, Hybrid Memristor C-MOS PUF30 and rPUF26 in Table 6. It can be seen that our MR-PUF and R/W PUF have higher uniformity in comparison with Hybrid Memristor C-MOS PUF and rPUF .
Diffuseness
Normally, a PUF produces multiple bits responses. Diffuseness evaluates the difference between response vectors for different challenges applied to the same PUF. Diffuseness is evaluated by calculating the average of HD for all the possible response vectors generated by the same PUF. Diffuseness ideally is 50% in percentage which is half the response vector length. We calculated Hamming Distance (HD) between responses of our MR-PUF to determine the diffuseness of our proposed PUF. The diffuseness calculated for our study is 49.6% that is close to the ideal value of 50%, as shown in Fig. 9.
We carried out a comparison between our MR-PUF and rPUF26 in Table 7. The diffuseness of the rPUF is slightly higher than our MR-PUF; however, both are almost 50%.
Uniqueness
In the event of applying the same challenge to different PUFs, the response vectors from different PUFs should be different due to intrinsic variations of each PUF. This is a vital characteristic that evaluates the uniqueness of the information that can be extracted from a PUF. Uniqueness is measured by inter-HD. Ideally, the HD between the responses to the same challenge from different PUF instances should be 50%. In this paper, we used 100 different MR-PUF instances to evaluate uniqueness and the result is shown in Fig. 10 the mean of HD of MR-PUF is 63.3 bits out of the 128 bits response which is very close to the ideal value of 64 bits. We further compared our MR-PUF, R/W memristor29, Hybrid Memristor C-MOS PUF30, and rPUF26 in Table 8. It can be observed that the uniqueness of the four PUFs are very close in values and very close to the ideal value 50%.
Repeatability
It is critical for a PUF to be used as an identification circuitry to always generate the same response when given the same challenge. While PUF uses physical units which are intrinsically chaotic, this criteria is difficult to meet precisely. In this study, we evaluated the repeatability of a response to a given challenge after hard resetting our MR-PUF. The HD count of the 128 bit response was equal to 0. Ensuring 100% repeatability of our TRNG MR-PUF.
Our MR-PUF has been verified in this section using NIST 15 tests. Additionally, the fundamental characteristics of our MR-PUF (uniformity, diffuseness, uniqueness and reliability metrics) have been evaluated. These tests verified that our model is hard to clone and resilient to adversary aims that predict responses to unseen challenges using a polynomial number of CRPs.
TRNG based memristor applications
In this section, we will propose a design and analysis methods for TRNG based memristors as the one we have designed in cryptographic environments and high-level security environments as in advanced metering infrastructures (AMI). The merit of using the applications proposed (block cipher design, smart meter application) is to support the point around practicality and stability of TRNG design within cryptographic environment allowing security testing within an application environment regardless of the proposed level of complexity of the design.
TRNG based memristor for cryptographic primitives
We are introducing a cryptographic design that will use our proposed MR-PUF. It is vital for ciphers that the communicating parties choose the key at random, without any possible bias or correlation between bits. The one-time padâs main weakness to a nonrandom key might weaken the cipher to the point of making other attacks feasible48. If the cipher selects the key randomly, then a brute-force attack will take \(2^N\) steps, where N is the keyâs length. In the case of AES, this takes \(2^{128}\) steps much more than the ability of even the fastest known computer. However, the assumption that the key is random plays an important role in avoiding a brute-force attackâs cost.
An adversary can learn a nonrandom key more quickly if it is known that the keyâs bits are biased toward zero. Likewise, if the even positioned key bits tend to agree with the previous bit in the key, the search space is immediately cut by a square root down to \(2^{N/2}\). Randomness might also impact the entire encryption process, not just key generation. An adversary could learn some information by simply observing the ciphertexts if encryption were deterministic. For example, if the sender transmits the same ciphertext twice, the adversary would observe that the same message was sent twice. In the case of a public-key scheme, a deterministic encryption technique provides the adversary with a way to detect if a given message is the encrypted one or not.
Block ciphers based on memristor based PUFs
We investigate our MR-PUF on block ciphers to achieve a true random encryption process. Our MR-PUF can be used in this section to convert block ciphers from PRNG to TRNG. Our TRNG Cipher block understudy is illustrated in Fig. 11. Figure 11 demonstrates a serial combination of two instances of a block cipher, denoted by \(E_1\) and \(E_2\), placed into the Cipher Block Chaining encryption mode. The input of the first block cipher is initialized to our MR-PUF response, a different MR-PUF response for each round, and each block cipher is initialized with its own master key, denoted k and \(k^*\) respectively.
The execution of one round of our MR-PUF based block cipher is as follows: given the input of the first block cipher TR-V which is the random response of our MR-PUF, and the current value of the keys \(k_i\) and \(k^*_i\) used by the two block ciphers, an intermediate value \(m_i\) is computed as \(Ek_i(xi)\). The output of the TRNG is evaluated as \(y_i = Ek^*_i(m_i)\). For the next round, the keys to be used by the block ciphers in the next round as \(k_{i+1} = k_i\) \(\oplus\) \(m_i\) and \(k^*{i+1} = k^*_i\) \(\oplus\) \(m_i\) and the new input for the first block cipher will be \(x_{i+1} = TR-V\) \(\oplus\) \(y_i\), where the TR-V is a new response output of our MR-PUF. We refer to \(k, k^*\) as the master keys and to \(k_i\), \(k^*_i\) as the running keys. The structure is generic thus that its input/ output/ key bit sizes are not specified (but identical): they depend on the actual block cipher chosen to instantiate the TRNG.
Security analysis
A comparison has been carried out to demonstrate and verify the randomness of the Cipher output when our true random MR-PUF response vector (TR-V) is used and when Pseudo-random vector (PR-V) is used. The output of the two block Cipher is tested by 8 NIST tests (due to the string bit size). The P value of each test is demonstrated to verify the randomness of the output Cipher string as shown in Table 9.
MR-PUF for advanced metering infrastructure (AMI)
In this section, a higher implementation of the MR-PUF was used on AMI systems. In an AMI system, most of the integrated circuit technologies including smart meters should support fundamental cryptographic competencies. Any smart meter should have its own secure cryptographic random value sequence. An AMI grid can consist of millions of smart meters. Accordingly, a large number of secure random keys in the range of millions are required. To avoid key disclosure in such high dynamic range and enhance the security of the entire communication system, utilization of a secure key management scheme is necessary.
In this paper, we explore an authenticated key exchange and message broadcasting protocols presented in49 exploiting our MR-PUF. In the explored scheme, the MR-PUF are embedded in both ends Head-End System (HES) and Smart Meters (SM) and used for generating the secrets random values. Okamoto Identification scheme a provably secure cryptographic protocol50, is employed in the authenticated key explored. This protocol meets the security requirements necessary for key management and mutual authentication. Utilizing this protocol, the SMs can authenticate and verify both the HES and the critical commands transmitted by HES. AMI Head-End System is positioned in the utility company, to gather data from SMs and send regulating commands, a two-way communication is required so the system can remotely manage configuration changes. Smart Meter is an electronic device that connects in two-way communication with the head-end system. It measures and records data such as energy usage and generation then transmits them to the HES in the utility.
Witness hiding identification protocols offer an adequate balance between security and efficiency. For example, for a protocol that accepts the prover successful only if it provides the complete private key. A cheating verifier may be able to extract some partial information on the private key, but the amount of information it can get is not sufficient for successful impersonation of the prover. Thus, the Okamoto protocol is a sufficient scheme as it satisfies the same properties of the honest-verifier. The important feature is that Okamotoâs protocol can be proved to be witness hiding. The proverâs private key is one such witness. An essential characteristic of Okamotoâs protocol is that it is witness indistinguishable, as the information seen by a random cheating verifier is independent of the particular witness used by the prover.
Cryptographic primitives used in the AMI
The utilized scheme under study consists of Initialization, Registration, and Mutual Authentication49. The Head-End System (HES) and the Smart Meter (SM) exchange a session key after authenticating each other.
-
InitializationâIn this phase, the Utility adjusts the system by executing the setup phase of the Pedersen Commitment scheme. Two challenges (\(C_k\)) and (\(C_a\)) are selected for which are applied to the PUFs implemented in the Head-End System (HES) and each Smart Meters (\(SM_i\)).
-
RegistrationâIn this part shown in algorithm 1, some information must be shared between the HES and \(SM_i\) before executing the protocol. Thus, the following procedures are executed in the registration phase. As shown in Fig. 12, the first two challenges \(C_k\) and \(C_a\) are given to \(PUF_{SM_i}\) generating the corresponding responses \(R^i_k\) and \(R^i_a\). The same procedure is done with the \(PUF_{HES}\) given \(C_a\) as a challenge and producing \(R_u\). For computing the commitments, the cryptographic hash function \(H_1\) is applied to all of the PUF responses. Thus, the parameters \(\alpha _i\), \(\beta _i\), and \(\gamma\) are produced. Where \(\alpha _i = H_1(R^a_i)\), \(\beta _i=H_1(R^i_u)\), and \(\gamma = H_1 (R_u)\). Then \(\beta _i\) and \(h^\gamma\) are stored in HES and \(SM_i\) respectively. These parameters are used to compute the Pedersen commitments of the PUF responses as follows \(com_i=g^{\alpha _i}h^{\beta _i}\), \(com_{ui}= g^u h^{\beta _i}\). \(com_i\) and \(com_ui\) are stored in HES and \(SM_i\), respectively.
-
Mutual Authentication- In this step, Okamoto protocol is used for mutual authentication between the HES and \(SM_i\). As shown in Fig. 12 and algorithm 2, they elaborate what is done in this phase. First, \(SM_i\) chooses y, s randomly and sends \(d=g^yh^s\) to the HES. Then, HES randomly chooses \(y', s'\) and e (as a challenge), and computes \(d'=g^{y'}h^{s'}\). Second, HES returns a tuple (\(d',e\)) to \(SM_i\). Third, \(SM_i\) chooses a random value \(e'\), computes \(v=s+e\beta _i\) and sends the tuple (u,v,eâ) to the HES. Fourth, HES verifies \(SM_i\) only if \(g^uh^v=d(com_i)^e\). Fifth, HES computes \(u'=y'+e'y, v'=s'+e'\beta _i\) and sends the tuple (uâ,vâ) to \(SM_i\). The last step, \(SM_i\) verifies HES only if \(g^u=d'(com_{ui})^{e'}\).
The initialization, registration and mutual authentication algorithms have been implemented on MATLAB(Mathworks) using Okamoto Protocol and our fabricated MR-PUF output. The head-end system was able to verify all the Smart Meters implemented on MATLAB, and the Smart Meters were able to verify the Head-end system.
Security analysis of our model
To ensure the randomness of the \(PUF_{HES}\) and \(PUF_{SMi}\) responses, NIST 800-22 statistical tests have been used to verify the randomness of \(PUF_{HES}\) and \(PUF_{SM1}\), verifying the randomness of our proposed MR-PUF as shown in Tables 10 and 11. Exploiting our MR-PUF, hash function, and Okamoto protool we used MATLAB to analyze the security of communication in the advanced metering infrastructure understudy. We enhanced the uniqueness of the MR-PUF response to a specific challenge, through applying a hash function to PUF responses to avoid colliding users from obtaining keys which they are not allowed to obtain individually ensured the high security for the key. Moreover, there is no need to store all the key materials as the session key is generated when needed and no other entity has used it.
Conclusion and future work
In our study, we presented the current research work on a low-cost, high endurance, and high speed Cu/HfO\(2/p^{++}\)Si MR-PUF relying on nano-particle dynamic simulation and analytical assessments. The thickness of the deposited HfO\(_2\) layer is in the range of nm (\(\sim\) 150 nm), thus, allowing fast switching time in ns. The HfO\(_2\) material is used as a switching medium of our MR-PUF providing high endurance due to the high stability of the material. Leveraging the memristorâs two level variations, we achieved a unique, reliable, and irreversible MR-PUF output. We tested different Cu/HfO\(2/p^{++}\)Si MR-PUFs, the same challenge gave different responses ensuring the uniqueness of our MR-PUF. The repeatability of each MR-PUF has been tested and our proposed MR-PUF has proven consistency as each MR-PUF reproduces the same response to the same repeated challenge. Furthermore, MR-PUF passed 15 NIST 800-22 statistical tests without any post-processing techniques . We investigated exploiting MR-PUF random output vector to achieve a TRNG block ciphers model and verified the randomness of the MR-PUF based Ciphersâ output using NIST tests.
We explored the comparison between the MR-PUF based Block Ciphers and the original Block Cipher design to demonstrate and test the randomness of our design. Moreover, in this paper we employed the MR-PUF in an authenticated key exchange and mutual authentication between the HES and SMs in an AMI. The AMI based on our MR-PUF met the essential security requirements as it passed the NIST tests and the mutual authentication was verified for both ends (HES and SM). To ensure that the session is always unique, hash functions were applied to PUF responses to avoid colluding users from obtaining keys which they are not allowed to obtain individually. We explored this by storing in each of the smart meters only the hashed values \(h^\gamma\) and computing the other hashed parameter \(\beta _i\) at the SM side by applying the hash function of the response of \(PUF_{SMi}\) which is unique for each SM. Our testing included simulating the environment and the verification testing of authentication to each side SM and HES.
As a future work, this research is meant to explore different attack scenarios of the proposed PUF architecture and it applications in different environment. This includes attacks built to influence the randomness of the proposed PUF circuits by introducing different voltage values to specific devices in search of collisions or reduce the write time in the memristor-based PUF to influence the repeatability feature. This in essence renders the PUF output no longer unclonable. Furthermore, improvements to the blockcipher model of application will be analyzed to explore practical and lightweight variations of the model. Additionally, AMI like any other smart grid application is exposed to several threats. The two major attacks targeting AMI systems are (a) attackers aiming to gain access to confidential data from users so they can infer the scheduled unitâs behaviour to target them for physical attacks; and (b) users may attack and alter the energy usage data to induce energy theft. Additional, exposure of these attacks is to be considered within our future work.
References
Stallings, W. Cryptography and Network Security, 4/E (Pearson Education India, 2006).
Addabbo, T., Alioto, M., Fort, A., Rocchi, S. & Vignoli, V. A feedback strategy to improve the entropy of a chaos-based random bit generator. IEEE Trans. Circuits Syst. I Regul. Pap. 53, 326â337. https://doi.org/10.1109/TCSI.2005.856670 (2006).
Balasch, J. et al. Design and testing methodologies for true random number generators towards industry certification. In 2018 IEEE 23rd European Test Symposium (ETS), 1â10. https://doi.org/10.1109/ETS.2018.8400697 (2018).
Pappu, R., Recht, B., Taylor, J. & Gershenfeld, N. Physical one-way functions. Science 297, 2026â2030. https://doi.org/10.1126/science.1074376 (2002).
Mazady, A., Rahman, M. T., Forte, D. & Anwar, M. Memristor puf-a security primitive: Theory and experiment. IEEE J. Emerg. Sel. Top. Circuits Syst. 5, 222â229. https://doi.org/10.1109/JETCAS.2015.2435532 (2015).
StipÄeviÄ, M. Quantum random number generators and their use in cryptography. In 2011 Proceedings of the 34th International Convention MIPRO, 1474â1479 (IEEE, 2011).
Gassend, B., Clarke, D., van Dijk, M. & Devadas, S. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC â02, 149â (IEEE Computer Society, Washington, DC, 2002).
Maes, R. & Verbauwhede, I. Physically unclonable functions: A study on the state of the art and future research directions. In Towards Hardware-Intrinsic Security, Security and Cryptology (2010).
Xu, X., Burleson, W. & Holcomb, D. E. Using statistical models to improve the reliability of delay-based pufs. In 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 547â552. https://doi.org/10.1109/ISVLSI.2016.125 (2016).
Anandakumar, N. N., Hashmi, M. S. & Sanadhya, S. K. Compact implementations of fpga-based pufs with enhanced performance. In 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID), 161â166. https://doi.org/10.1109/VLSID.2017.7 (2017).
Priadarshini, A. & Jagadeeswari, M. Low power reconfigurable fpga based on sram. In 2013 International Conference on Computer Communication and Informatics, 1â6. https://doi.org/10.1109/ICCCI.2013.6466160 (2013).
Maes, R., Van Herrewege, A. & Verbauwhede, I. Pufky: A fully functional puf-based cryptographic key generator. In Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems, CHESâ12, 302â319 (Springer, Berlin, 2012). https://doi.org/10.1007/978-3-642-33027-8_18
Suh, G. E. & Devadas, S. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Annual Design Automation Conference, DAC â07, 9â14. https://doi.org/10.1145/1278480.1278484 (ACM, New York, 2007).
Beckmann, N. & Potkonjak, M. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions, Vol. 5806, 206â220. https://doi.org/10.1007/978-3-642-04431-1_15 (2009).
Bolotnyy, L. & Robins, G. Physically unclonable function-based security and privacy in rfid systems. In Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, PERCOM â07, 211â220 (IEEE Computer Society, Washington, DC, 2007). https://doi.org/10.1109/PERCOM.2007.26.
Guajardo, J., Kumar, S. S., Schrijen, G.-J. & Tuyls, P. Fpga intrinsic pufs and their use for ip protection. In Cryptographic Hardware and Embedded Systems - CHES 2007 (eds Paillier, P. & Verbauwhede, I.) 63â80 (Springer, Berlin, 2007).
Kursawe, K., Sadeghi, A., Schellekens, D., Skoric, B. & Tuyls, P. Reconfigurable physical unclonable functionsâenabling technology for tamper-resistant storage. In 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 22â29. https://doi.org/10.1109/HST.2009.5225058 (2009).
Maes, R. & Verbauwhede, I. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions 3â37 (Springer, 2010).
Rührmair, U. et al. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS â10, 237â249 (ACM, New York, 2010). https://doi.org/10.1145/1866307.1866335.
Pavlina, C., Torrey, J. & Temkin, K. Abstract: Characterizing eeprom for usage as a ubiquitous puf source. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 168, https://doi.org/10.1109/HST.2017.7951832 (2017).
Böhm, C., Hofer, M. & Pribyl, W. A microcontroller sram-puf. In 2011 5th International Conference on Network and System Security, 269â273. https://doi.org/10.1109/ICNSS.2011.6060013 (2011).
Su, Y., Holleman, J. & Otis, B. P. A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J. Solid-State Circuits 43, 69â77. https://doi.org/10.1109/JSSC.2007.910961 (2008).
Kumar, S. S., Guajardo, J., Maes, R., Schrijen, G. & Tuyls, P. Extended abstract: The butterfly puf protecting ip on every fpga. In 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 67â70. https://doi.org/10.1109/HST.2008.4559053 (2008).
Zhang, L., Kong, Z. H., Chang, C., Cabrini, A. & Torelli, G. Exploiting process variations and programming sensitivity of phase change memory for reconfigurable physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 9, 921â932. https://doi.org/10.1109/TIFS.2014.2315743 (2014).
Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. Emerging physical unclonable functions with nanotechnology. IEEE Access 4, 61â80. https://doi.org/10.1109/ACCESS.2015.2503432 (2016).
Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015).
Gao, Y. et al. Efficient erasable pufs from programmable logic and memristors. IACR Cryptol. ePrint Arch. 2018, 358 (2018).
Rose, G. S., McDonald, N., Yan, L., Wysocki, B. & Xu, K. Foundations of memristor based puf architectures. In 2013 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH), 52â57. https://doi.org/10.1109/NanoArch.2013.6623044 (2013).
Rose, G. S., McDonald, N., Yan, L. & Wysocki, B. A write-time based memristive puf for hardware security applications. In 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 830â833. https://doi.org/10.1109/ICCAD.2013.6691209 (2013).
Mathew, J., Chakraborty, R. S., Sahoo, D. P., Yang, Y. & Pradhan, D. K. A novel memristor-based hardware security primitive. ACM Trans. Embed. Comput. Syst. 14, 60:1-60:20. https://doi.org/10.1145/2736285 (2015).
Huang, C., Shen, W. C., Tseng, Y., King, Y. & Lin, C. A contact-resistive random-access-memory-based true random number generator. IEEE Electron Device Lett. 33, 1108â1110. https://doi.org/10.1109/LED.2012.2199734 (2012).
Balatti, S., Ambrogio, S., Wang, Z. & Ielmini, D. True random number generation by variability of resistive switching in oxide-based devices. IEEE J. Emerg. Sel. Top. Circuits Syst. 5, 214â221. https://doi.org/10.1109/JETCAS.2015.2426492 (2015).
Wei, Z. et al. True random number generator using current difference based on a fractional stochastic model in 40-nm embedded reram. In 2016 IEEE International Electron Devices Meeting (IEDM), 4.8.1â4.8.4. https://doi.org/10.1109/IEDM.2016.7838349 (2016).
Jiang, H. et al. A novel true random number generator based on a stochastic diffusive memristor. Nat. Commun. 8, 882. https://doi.org/10.1038/s41467-017-00869-x (2017).
Aziza, H. et al. True random number generator integration in a resistive ram memory array using input current limitation. IEEE Trans. Nanotechnol. 19, 214â222. https://doi.org/10.1109/TNANO.2020.2976735 (2020).
Herrero-Collantes, M. & Garcia-Escartin, J. C. Quantum random number generators. Rev. Mod. Phys. 89, 015004 (2017).
Impagliazzo, R., Levin, L. A. & Luby, M. Pseudo-random generation from one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, 12â24 (ACM, 1989).
Rukhin, A., Soto, J., Nechvatal, J., Smid, M. & Barker, E. A statistical test suite for random and pseudorandom number generators for cryptographic applications (Tech. Rep, Booz-Allen and Hamilton Inc Mclean Va, 2001).
Ruhkin, A. & Zenil, H . Statistical testing of randomness: Old and new procedures. In Randomness Through Computation (Singapore World Scientific, 2011).
Rukhin, A. et al. Nist special publication 800-22: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. In NIST Special Publication 800-22 (2010).
Jiang, H. et al. Sub-10 nm ta channel responsible for superior performance of a hfo2 memristor. Sci. Rep. 6, 28525 (2016).
Abunahla, H., Mohammad, B., Homouz, D. & OâKelly, C. Modeling valance change memristor device: Oxide thickness, material type, and temperature effects. IEEE Trans. Circuits Syst. I Regul. Pap. PP, 1â10. https://doi.org/10.1109/TCSI.2016.2622225 (2016).
Wu, L., Liu, H., Li, J., Wang, S. & Wang, X. A multi-level memristor based on al-doped hfo 2 thin film. Nanoscale Res. Lett. 14, 1â7 (2019).
Dirkmann, S. & Mussenbrock, T. Resistive switching in memristive electrochemical metallization devices. AIP Adv. 7, 065006 (2017).
Sahay, S. & Suri, M. Recent trends in hardware security exploiting hybrid CMOS-resistive memory circuits. Semicond. Sci. Technol. 32, 123001. https://doi.org/10.1088/1361-6641/aa8f07 (2017).
Uddin, M., Majumder, M. B. & Rose, G. S. Robustness analysis of a memristive crossbar puf against modeling attacks. IEEE Trans. Nanotechnol. 16, 396â405. https://doi.org/10.1109/TNANO.2017.2677882 (2017).
Koeberl, P., KocabaÅ, Ã. & Sadeghi, A.-R. Memristor pufs: A new generation of memory-based physically unclonable functions. In 2013 Design, Automation Test in Europe Conference Exhibition (DATE) 428â431. https://doi.org/10.7873/DATE.2013.096 (2013).
Gennaro, R. Randomness in cryptography. IEEE Secur. Priv. 4, 64â67 (2006).
Delavar, M., Mirzakuchaki, S., Ameri, M. H. & Mohajeri, J. Puf-based solutions for secure communications in advanced metering infrastructure (ami). Int. J. Commun. Syst. 30, e3195 (2017).
Okamoto, T. Provably secure and practical identification schemes and corresponding signature schemes. In Advances in CryptologyâCRYPTOâ 92 (ed. Brickell, E. F.) 31â53 (Springer, Berlin, 1993).
Acknowledgements
This work is fully supported by the Center for Cybersecurity (CCS), NYUAD. We thank Sabina Abdul Hadi and Khaled Humood (Khalifa Univeristy) for their contribution with the memristor readings.
Author information
Authors and Affiliations
Contributions
H.M.I. wrote the manuscript and prepared all tables and figures (1, 7â12), collected the memristor output, evaluated the randomness and conducted all security tests carried in this paper. H.Ab. verified the functionality of the memristor device prepared figures (2â6) on Keithley 4200-SCS Parameter Analyzer. The conception of work was created by H.Al. reviewed the paper and designed the security analysis and experiments in addition to the testing that needed to take place. Together with M.B., they reviewed the paper and gave the final critical revision and approval. All authors reviewed the manuscript and provided feedback.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Ibrahim, H.M., Abunahla, H., Mohammad, B. et al. Memristor-based PUF for lightweight cryptographic randomness. Sci Rep 12, 8633 (2022). https://doi.org/10.1038/s41598-022-11240-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-022-11240-6
This article is cited by
-
Resilience evaluation of memristor based PUF against machine learning attacks
Scientific Reports (2024)
-
Security primitives for memoryless IoT devices based on Physical Unclonable Functions and True Random Number Generators
Scientific Reports (2024)
-
Physics inspired compact modelling of \(\hbox {BiFeO}_3\) based memristors
Scientific Reports (2022)