Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3299874.3317970acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

LPN-based Device Authentication Using Resistive Memory

Published: 13 May 2019 Publication History

Abstract

Recent progress in the design and implementation of resistive memory components such as RRAMs and PCMs has introduced opportunities for developing novel hardware security solutions using unique physical properties of these devices. In this work, we utilize the faults in HfOx-based resistive RRAMs to design secure, lightweight device authentication protocols. To detail our design, first, we introduce the device breakdown problem due to high bias conditions in resistive memory and the physics behind non-recoverable resistive states. Then, using the concepts of learning with parity noise (LPN) based authentication protocols, we demonstrate that simple READ and WRITE operations on resistive memory cells with defects can perform necessary calculation required for LPN-based authentication schemes. Next, we design two simple authentication protocols using resistive memory based hardware and provide a detailed security analysis for these protocols. We find that these authentication mechanisms can offer significant improvement against its CMOS counterpart regarding the area and power budget. Finally, we provide detailed physical design requirements for the memory components. The resistive memory components that are capable of performing the proposed authentication protocols have also been designed and fabricated. From our analysis, we find that these memory dependent authentication protocols are lightweight, resistant to learning attacks from active and passive adversaries, and reliable under normal changes in operating conditions.

References

[1]
Md Tanvir Arafin, Carson Dunbar, Gang Qu, N. McDonald, and L. Yan. 2015. A survey on memristor modeling and security applications. In Quality Electronic Design (ISQED), 2015 16th International Symposium on. IEEE, 440--447.
[2]
Md Tanvir Arafin and Gang Qu. 2018. Memristors for Secret Sharing-Based Lightweight Authentication. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 99 (2018), 1--13.
[3]
E. R. Berlekamp, R. J. McEliece, and H. C. A. van Tilborg. 1978. On the inherent intractability of certain coding problems. (1978).
[4]
Avrim Blum, Adam Kalai, and Hal Wasserman. 2003. Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM (JACM), Vol. 50, 4 (2003), 506--519.
[5]
Julien Bringer, Hervé Chabanne, and Emmanuelle Dottax. 2006. HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on. IEEE, 28--33.
[6]
Daniela Carta, Peter Guttmann, Anna Regoutz, Ali Khiat, Alexander Serb, Isha Gupta, Adnan Mehonic, Mark Buckwell, Steven Hudziak, A. J. Kenyon, et al. 2016. X-ray spectromicroscopy investigation of soft and hard breakdown in RRAM devices. Nanotechnology, Vol. 27, 34 (2016), 345705.
[7]
Andre Esser, Robert Kübler, and Alexander May. 2017. LPN decoded. In Annual International Cryptology Conference. Springer, 486--514.
[8]
Ximeng Guan, Shimeng Yu, and H-S Philip Wong. 2012. A SPICE Compact Model of Metal Oxide Resistive Switching Memory With Variations. IEEE Electron Device Letters, Vol. 33, 10 (2012), 1405--1407.
[9]
Johan Håstad. 2001. Some optimal inapproximability results. Journal of the ACM (JACM), Vol. 48, 4 (2001), 798--859.
[10]
Nicholas J. Hopper and Manuel Blum. 2001. Secure human identification protocols. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 52--66.
[11]
Chien-Yuan Huang, Wen Chao Shen, Yuan-Heng Tseng, Ya-Chin King, and Chrong-Jung Lin. 2012. A contact-resistive random-access-memory-based true random number generator. IEEE Electron Device Letters, Vol. 33, 8 (2012), 1108--1110.
[12]
H. Jiang, D. Belkin, S. E. Savel'ev, S. Lin, Z Wang, Y. Li, S. Joshi, R. Midya, C. Li, M. Rao, et al. 2017. A novel true random number generator based on a stochastic diffusive memristor. Nature communications, Vol. 8, 1 (2017), 882--882.
[13]
Ari Juels and Stephen A. Weis. 2005. Authenticating pervasive devices with human protocols. In Annual international cryptology conference. Springer, 293--308.
[14]
Jonathan Katz and Ji Sun Shin. 2006. Parallel and concurrent security of the HB and HB+ protocols. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 73--87.
[15]
Michael Kearns. 1998. Efficient noise-tolerant learning from statistical queries. Journal of the ACM (JACM), Vol. 45, 6 (1998), 983--1006.
[16]
Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, and Daniele Venturi. 2011. Efficient authentication from hard learning problems. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 7--26.
[17]
S. B. Lee, D. H. Kwon, K. Kim, H. K. Yoo, S. Sinn, M. Kim, B. Kahng, and B. S. Kang. 2012. Avoiding fatal damage to the top electrodes when forming unipolar resistance switching in nano-thick material systems. Journal of Physics D: Applied Physics, Vol. 45, 25 (2012), 255101.
[18]
NIST. 2017. Post-Quantum Cryptography. https://csrc.nist.gov/projects/post-quantum-cryptography
[19]
Gang Qu and Lin Yuan. 2014. Design things for the internet of things: an EDA perspective. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, 411--416.
[20]
Cong Xu, Xiangyu Dong, Norman P. Jouppi, and Yuan Xie. 2011. Design implications of memristor-based RRAM cross-point structures. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011. IEEE, 1--6.

Cited By

View all
  • (2023)Physical Unclonable Functions (PUF) for IoT DevicesACM Computing Surveys10.1145/359146455:14s(1-31)Online publication date: 8-Apr-2023
  • (2020)Security Challenges of Processing-In-Memory SystemsProceedings of the 2020 on Great Lakes Symposium on VLSI10.1145/3386263.3411365(229-234)Online publication date: 7-Sep-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GLSVLSI '19: Proceedings of the 2019 Great Lakes Symposium on VLSI
May 2019
562 pages
ISBN:9781450362528
DOI:10.1145/3299874
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. device authentication
  2. learning parity in the presence of noise (lpn)
  3. one-time writable memory
  4. resistive random access memory (rram)

Qualifiers

  • Research-article

Funding Sources

  • AFOSR MURI

Conference

GLSVLSI '19
Sponsor:
GLSVLSI '19: Great Lakes Symposium on VLSI 2019
May 9 - 11, 2019
VA, Tysons Corner, USA

Acceptance Rates

Overall Acceptance Rate 312 of 1,156 submissions, 27%

Upcoming Conference

GLSVLSI '25
Great Lakes Symposium on VLSI 2025
June 30 - July 2, 2025
New Orleans , LA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Physical Unclonable Functions (PUF) for IoT DevicesACM Computing Surveys10.1145/359146455:14s(1-31)Online publication date: 8-Apr-2023
  • (2020)Security Challenges of Processing-In-Memory SystemsProceedings of the 2020 on Great Lakes Symposium on VLSI10.1145/3386263.3411365(229-234)Online publication date: 7-Sep-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media