Exploiting switching properties of non-volatile memory chips for data security applications

被引:0
作者
Chakraborty, Supriya [1 ]
Suri, Manan [1 ]
机构
[1] Department of Electrical Engineering, Indian Institute of Technology Delhi, Hauz Khas, New Delhi
来源
Memories - Materials, Devices, Circuits and Systems | 2023年 / 4卷
关键词
Cryptography; Flash; Hardware security; Non-volatile memory; One-time padding; RRAM; TRNG;
D O I
10.1016/j.memori.2023.100044
中图分类号
学科分类号
摘要
This paper presents a technique of utilizing Commercial-Off-The-Self (COTS) Non-Volatile Memory (NVM) chips for data security applications. In particular, True Random Numbers (TRNs) are generated by harnessing the latency variability observed in NVM chips. Subsequent series of mathematical operations are implemented as post-processing techniques to increase the randomness of the TRNs. The generated TRNs are then utilized as a source of random keys for One-Time Pad (OTP) cryptosystem. The proposed methodology of TRNs extraction is experimentally validated on three different types of NVM technologies. TRNG throughput in a range of 0.09 Kb/s to 0.67 Kb/s is observed for the investigated technologies. Generated TRNs pass all the tests of NIST SP 800-22 statistical test suite with significant P–values. Metrics like MSE, CC, SSIM, NPCR, UACI, PSNR, and key space are also analyzed for the OTP cryptosystem. © 2023 The Author(s)
引用
收藏
相关论文
共 20 条
[11]  
Rashid M.I., Ferdaus F., Talukder B.B., Henny P., Beal A.N., Rahman M.T., True random number generation using latency variations of FRAM, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 29, 1, pp. 14-23, (2020)
[12]  
Chakraborty S., Garg A., Suri M., True random number generation from commodity NVM chips, IEEE Trans. Electron Devices, 67, 3, pp. 888-894, (2020)
[13]  
Gutub A., Al-Ghamdi M., Hiding shares by multimedia image steganography for optimized counting-based secret sharing, Multimedia Tools Appl., 79, 11, pp. 7951-7985, (2020)
[14]  
Daru M.S., Jager T., Encrypted cloud-based control using secret sharing with one-time pads, 2019 IEEE 58th Conference on Decision and Control, CDC, pp. 7215-7221, (2019)
[15]  
Shamir A., How to share a secret, Commun. ACM, 22, 11, pp. 612-613, (1979)
[16]  
Zheng W., Wang K., Wang F.-Y., Gan-based key secret-sharing scheme in blockchain, IEEE Trans. Cybern., 51, 1, pp. 393-404, (2020)
[17]  
Ferdaus F., Talukder B.B., Sadi M., Rahman M.T., True random number generation using latency variations of commercial MRAM chips, 2021 22nd International Symposium on Quality Electronic Design, ISQED, pp. 510-515, (2021)
[18]  
Diab H., An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations, IEEE Access, 6, pp. 42227-42244, (2018)
[19]  
Wu X., Kan H., Kurths J., A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps, Appl. Soft Comput., 37, pp. 24-39, (2015)
[20]  
Kwok H., Tang W.K., A fast image encryption system based on chaotic maps with finite precision representation, Chaos Solitons Fractals, 32, 4, pp. 1518-1529, (2007)