Tamper Sensitive Ternary ReRAM-Based PUFs

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The physical properties of resistive random-access memories can be exploited to design physical unclonable functions, they can also be used to insert sensing elements detecting tampering activities. We are presenting how un-filtered cryptographic key generation cycles can permanently damage about 20% to 40% of the memory cell population, while the strong cells return to their pristine state after operation. During an enrollment cycle performed once upfront, the weak cells are identified, tracked with a ternary state, and never used during subsequent key generation cycles thereafter. The weak cells are likely to be damaged when the opponent blindly characterizes the physical unclonable functions or attempt to generate cryptographic keys. Thereby these weaker cells act as sensing elements of this type of attacks. The cryptographic scheme is optimized to tolerate a certain level of failure of the stronger cells, and to compute ternary states to keep track of the weaker cells. The implementation was written in Phyton and C++ at the server level, and in C at the client level. The protocols use the standard hash algorithm SHA-3, and the extended output function SHAKE.

Original languageEnglish (US)
Title of host publicationIntelligent Computing - Proceedings of the 2021 Computing Conference
EditorsKohei Arai
PublisherSpringer Science and Business Media Deutschland GmbH
Pages1020-1040
Number of pages21
ISBN (Print)9783030801281
DOIs
StatePublished - 2021
EventComputing Conference, 2021 - Virtual, Online
Duration: Jul 15 2021Jul 16 2021

Publication series

NameLecture Notes in Networks and Systems
Volume285
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceComputing Conference, 2021
CityVirtual, Online
Period7/15/217/16/21

Keywords

  • Cyber-physical systems
  • Intrusion detection
  • Secure protocols

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Tamper Sensitive Ternary ReRAM-Based PUFs'. Together they form a unique fingerprint.

Cite this