TY - GEN
T1 - Bit Error Rate Analysis of Pre-formed ReRAM-based PUF
AU - Jain, Saloni
AU - Wilson, Taylor
AU - Assiri, Sareh
AU - Cambou, Bertrand
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - Various Resistive Random Access Memory (ReRAM) devices have been used to generate cryptographic keys. The physical characteristics exploited are often related to the forming of conductive filaments, as well as the programming of cells. In this paper, key generation methods based on pre-formed ReRAM cells are analyzed. An evaluation of the bit error rate (BER) of cryptographic keys is conducted by analyzing physically unclonable function arrays that have been exposed to changes such as temperature drifts, aging, and other factors. Understanding and utilizing this data for security requires an insight of the behavior of physical elements under varying temperatures and currents. In order to guarantee maximum data security by leveraging cryptographic key generation with these methods, we must ensure that keys have low error-rates, which is only possible by producing stronger keys. We are reporting experimental data showing conditions in which the bit error rates are as low as 10 - 6.
AB - Various Resistive Random Access Memory (ReRAM) devices have been used to generate cryptographic keys. The physical characteristics exploited are often related to the forming of conductive filaments, as well as the programming of cells. In this paper, key generation methods based on pre-formed ReRAM cells are analyzed. An evaluation of the bit error rate (BER) of cryptographic keys is conducted by analyzing physically unclonable function arrays that have been exposed to changes such as temperature drifts, aging, and other factors. Understanding and utilizing this data for security requires an insight of the behavior of physical elements under varying temperatures and currents. In order to guarantee maximum data security by leveraging cryptographic key generation with these methods, we must ensure that keys have low error-rates, which is only possible by producing stronger keys. We are reporting experimental data showing conditions in which the bit error rates are as low as 10 - 6.
KW - Bit error rate
KW - Challenge Response Pairs (CRPs)
KW - Cryptographic key generation
KW - Fuzzy cells
KW - Physical Unclonable Function (PUF)
KW - Resistive Random Access Memory (ReRAM)
KW - Unlimited digital fingerprints
UR - http://www.scopus.com/inward/record.url?scp=85135097502&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85135097502&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-10467-1_54
DO - 10.1007/978-3-031-10467-1_54
M3 - Conference contribution
AN - SCOPUS:85135097502
SN - 9783031104664
T3 - Lecture Notes in Networks and Systems
SP - 882
EP - 901
BT - Intelligent Computing - Proceedings of the 2022 Computing Conference
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - Computing Conference, 2022
Y2 - 14 July 2022 through 15 July 2022
ER -