论文标题
使用无源RRAM横杆阵列的硬件安全性原始图:新颖的TRNG和PUF设计
Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs
论文作者
论文摘要
随着电子产品的快速发展,这些设备的安全性和隐私方面非常重要。对于安全系统的设计,物理无吻合功能(PUF)和TRUE随机数生成器(TRNG)是安全应用程序的关键硬件安全原始图。本文提出了PUF和TRNG在RRAM横杆结构上的新颖实现。首先,基于写下和50%的切换概率脉冲提出了在RRAM横杆中实现TRNG的两种技术。使用NIST测试套件评估所提出的TRNG的随机性。接下来,提出了在RRAM横杆中实现PUF的体系结构。 PUF的初始熵源来自TRNG,并收集挑战反应对(CRP)。拟议的PUF利用了设备的变化和偷偷摸摸的路线来产生独特的CRP。我们通过广泛的实验证明了100%的可靠性,47.78%的唯一性,均匀性为49.79%,并且在没有任何后加工技术的情况下,比特确定性为48.57%。最后,将设计与文献进行了比较,以评估其实施效率,这显然被认为优于最先进的效率。
With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are significant. For the design of secure systems, physical unclonable function (PUF) and true random number generator (TRNG) are critical hardware security primitives for security applications. This paper proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure. Firstly, two techniques to implement the TRNG in the RRAM crossbar are presented based on write-back and 50% switching probability pulse. The randomness of the proposed TRNGs is evaluated using the NIST test suite. Next, an architecture to implement the PUF in the RRAM crossbar is presented. The initial entropy source for the PUF is used from TRNGs, and challenge-response pairs (CRPs) are collected. The proposed PUF exploits the device variations and sneak-path current to produce unique CRPs. We demonstrate, through extensive experiments, reliability of 100%, uniqueness of 47.78%, uniformity of 49.79%, and bit-aliasing of 48.57% without any post-processing techniques. Finally, the design is compared with the literature to evaluate its implementation efficiency, which is clearly found to be superior to the state-of-the-art.