TY - GEN
T1 - True Random Numbers from Pairs of SRAM Devices
AU - Rios, Manuel Aguilar
AU - Partridge, Michael
AU - Jain, Saloni
AU - Cambou, Bertrand
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - Static random-access memory (SRAM) physically unclonable functions (PUFs) have been used to design true random number generators capable of passing the National Institute of Standards and Technology (NIST) statistical test suite for randomness. These SRAM PUF-based true random number generators (TRNGs) rely on unstable cells that randomly awake as a ‘0’ or a ‘1’ when the power is cycled. The three issues with the previously proposed SRAM TRNGs that we aim to address are the limited number of challenge-response pairs (CRPs), the overhead required to select “flaky” cells, and the restriction of a device to support either TRNG or authentication, but not both. We present an SRAM PUF-based TRNG that passes NIST randomness tests designed with two SRAM devices and a lightweight post-processing method to enhance randomness. This design benefits from a much higher number of CRPs, does not need to identify unstable cells, and supports authentication and true random number generation. The work presented uses commercially available development boards and SRAM devices, a simple custom circuit board to connect the two, lightweight post-process, and a combination of C++ and python3 to drive the system.
AB - Static random-access memory (SRAM) physically unclonable functions (PUFs) have been used to design true random number generators capable of passing the National Institute of Standards and Technology (NIST) statistical test suite for randomness. These SRAM PUF-based true random number generators (TRNGs) rely on unstable cells that randomly awake as a ‘0’ or a ‘1’ when the power is cycled. The three issues with the previously proposed SRAM TRNGs that we aim to address are the limited number of challenge-response pairs (CRPs), the overhead required to select “flaky” cells, and the restriction of a device to support either TRNG or authentication, but not both. We present an SRAM PUF-based TRNG that passes NIST randomness tests designed with two SRAM devices and a lightweight post-processing method to enhance randomness. This design benefits from a much higher number of CRPs, does not need to identify unstable cells, and supports authentication and true random number generation. The work presented uses commercially available development boards and SRAM devices, a simple custom circuit board to connect the two, lightweight post-process, and a combination of C++ and python3 to drive the system.
KW - Physical unclonable function
KW - Static random access memory
KW - TRNG
KW - TRNG with SRAM PUFs
UR - http://www.scopus.com/inward/record.url?scp=85199494956&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85199494956&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-62269-4_41
DO - 10.1007/978-3-031-62269-4_41
M3 - Conference contribution
AN - SCOPUS:85199494956
SN - 9783031622687
T3 - Lecture Notes in Networks and Systems
SP - 630
EP - 650
BT - Intelligent Computing - Proceedings of the 2024 Computing Conference
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - Science and Information Conference, SAI 2024
Y2 - 11 July 2024 through 12 July 2024
ER -