Exploiting switching properties of non-volatile memory chips for data security applications

被引:0
作者
Chakraborty, Supriya [1 ]
Suri, Manan [1 ]
机构
[1] Department of Electrical Engineering, Indian Institute of Technology Delhi, Hauz Khas, New Delhi
来源
Memories - Materials, Devices, Circuits and Systems | 2023年 / 4卷
关键词
Cryptography; Flash; Hardware security; Non-volatile memory; One-time padding; RRAM; TRNG;
D O I
10.1016/j.memori.2023.100044
中图分类号
学科分类号
摘要
This paper presents a technique of utilizing Commercial-Off-The-Self (COTS) Non-Volatile Memory (NVM) chips for data security applications. In particular, True Random Numbers (TRNs) are generated by harnessing the latency variability observed in NVM chips. Subsequent series of mathematical operations are implemented as post-processing techniques to increase the randomness of the TRNs. The generated TRNs are then utilized as a source of random keys for One-Time Pad (OTP) cryptosystem. The proposed methodology of TRNs extraction is experimentally validated on three different types of NVM technologies. TRNG throughput in a range of 0.09 Kb/s to 0.67 Kb/s is observed for the investigated technologies. Generated TRNs pass all the tests of NIST SP 800-22 statistical test suite with significant P–values. Metrics like MSE, CC, SSIM, NPCR, UACI, PSNR, and key space are also analyzed for the OTP cryptosystem. © 2023 The Author(s)
引用
收藏
相关论文
共 20 条
  • [1] Biryukov A., Perrin L., State of the art in lightweight symmetric cryptography, (2017)
  • [2] Argyris A., Pikasis E., Syvridis D., Gb/s one-time-pad data encryption with synchronized chaos-based true random bit generators, J. Lightwave Technol., 34, 22, pp. 5325-5331, (2016)
  • [3] Boakye-Boateng K., Kuada E., Antwi-Boasiako E., Djaba E., Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads, IEEE Internet Things J., 6, 2, pp. 3925-3933, (2019)
  • [4] Kietzmann P., Schmidt T.C., Wahlisch M., A guideline on pseudorandom number generation (PRNG) in the IoT, ACM Comput. Surv., 54, 6, pp. 1-38, (2021)
  • [5] Alioto M., Trends in hardware security: From basics to ASICs, IEEE Solid-State Circ. Mag., 11, 3, pp. 56-74, (2019)
  • [6] Chen A., A review of emerging non-volatile memory (NVM) technologies and applications, Solid-State Electron., 125, pp. 25-38, (2016)
  • [7] Mahmoodi M., Strukov D., Kavehei O., Experimental demonstrations of security primitives with nonvolatile memories, IEEE Trans. Electron Devices, 66, 12, pp. 5050-5059, (2019)
  • [8] Nisar A., Dhull S., Shreya S., Kaushik B.K., Energy-efficient advanced data encryption system using spin-based computing-in-memory architecture, IEEE Trans. Electron Devices, 69, 4, pp. 1736-1742, (2022)
  • [9] Li F., Lim J.L.K., Reram non-volatile AES encryption engine for IoT application, 2019 32nd IEEE International System-on-Chip Conference, SOCC, pp. 359-364, (2019)
  • [10] Ray B., Milenkovic A., True random number generation using read noise of flash memory cells, IEEE Trans. Electron Devices, 65, 3, pp. 963-969, (2018)