Key Recovery for Content Protection Using Ternary PUFs Designed with Pre‐Formed ReRAM

Research output: Contribution to journalArticlepeer-review

Abstract

Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files. Such an approach is only valuable when the physical element offers sufficient tamper resistance. Otherwise, error correcting codes should be able to handle any variations arising from aging, and environmentally induced drifts of the terminal devices. The ternary cryptographic protocols presented in this paper, leverage the physical properties of resistive random‐access memories operating at extremely low power in the pre‐forming range to create an additional level of security, while masking the most unstable cells during key generation cycles. The objective is to reach bit error rates below the 10−3 range from elements subjected to drifts and environmental effects. We propose replacing the error correcting codes with light search engines, that use ciphertexts as helper data to reduce information leakage. The tamper‐resistant schemes discussed in the paper include: (i) a cell‐pairing differential method to hide the physical parameters; (ii) an attack detection system and a low power self‐destruct mode; (iii) a multi‐factor authentication, information control, and a one‐time read‐only function. In the experimental section, we describe how prototypes were fabricated to test and quantify the performance of the suggested methods, using static random access memory devices as the benchmark.

Original languageEnglish (US)
Article number1785
JournalApplied Sciences (Switzerland)
Volume12
Issue number4
DOIs
StatePublished - Feb 1 2022

Keywords

  • Content protection
  • Cybersecurity
  • Error correction
  • Key recovery
  • Network of IoT
  • Tamper resistance
  • Unclonable devices

ASJC Scopus subject areas

  • Materials Science(all)
  • Instrumentation
  • Engineering(all)
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'Key Recovery for Content Protection Using Ternary PUFs Designed with Pre‐Formed ReRAM'. Together they form a unique fingerprint.

Cite this