Skip to main content

Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 508))

Included in the following conference series:

  • 651 Accesses

Abstract

Resistive random-access memory (ReRAM) physically unclonable functions (PUFs) have recently been proposed for direct analog key encapsulation. Pre-formed ReRAM cells can produce reliable and unique responses when injected with very low currents, with the value of these responses varying with the current. The values of current used on ReRAM cells coupled with the response they produce can be used to encapsulate keys with a PUF directly. Analog key encapsulation with ReRAM cells has been simulated using data gathered from precision machinery in a lab setting and has been theorized to work. This study presents the reliability of analog key encapsulation with ReRAM PUFs on a hardware shield. It illustrates how the hardware implementation of direct analog key encapsulation encryption with ReRAM PUFs produces reliable responses on par with the simulated results. This study shows the approach followed to implement encryption and decryption of the plaintext based on hardware on both sides, the client and server. The implementation was written in C++ on the client level and Python 3 on the server level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Hasib, A., Haque, A.A.M.M.: A comparative study of the performance and security issues of AES and RSA cryptography. In: 2008 Third International Conference on Convergence and Hybrid Information Technology, vol. 2, pp. 505–510. IEEE (2008)

    Google Scholar 

  2. Assiri, S., Cambou, B.: Homomorphic password manager using multiple-hash with PUF. In: Arai, K. (ed.) FICC 2021. AISC, vol. 1363, pp. 772–792. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-73100-7_55

    Chapter  Google Scholar 

  3. Assiri, S., Cambou,B., Booher, D.D., Miandoab, D.G., Mohammadinodoushan, M.: Key exchange using ternary system to enhance security. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0488–0492. IEEE (2019)

    Google Scholar 

  4. Assiri, S., Cambou, B., Booher, D.D., Mohammadinodoushan, M.: Software implementation of a SRAM PUF-based password manager. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1230, pp. 361–379. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-52243-8_26

    Chapter  Google Scholar 

  5. Cambou, B.: Encoding ternary data for PUF environments, 29 November 2018. US Patent App. 16/036,477

    Google Scholar 

  6. Cambou, B., Hély, D., Assiri, S.: Cryptography with analog scheme using memristors. ACM J. Emerg. Technol. Comput. Syst. (JETC) 16(4), 1–30 (2020)

    Article  Google Scholar 

  7. Cambou, B., Orlowski, M.: PUF designed with resistive ram and ternary states. In: Proceedings of the 11th Annual Cyber and Information Security Research Conference. CISRC 2016, New York, NY, USA, 2016. Association for Computing Machinery (2016)

    Google Scholar 

  8. Cambou, B., Philabaum, C., Booher, D., Telesca, D.A.: Response-based cryptographic methods with ternary physical unclonable functions. In: Arai, K., Bhatia, R. (eds.) FICC 2019. LNNS, vol. 70, pp. 781–800. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-12385-7_55

    Chapter  Google Scholar 

  9. Cambou, B., Telesca, D.: Ternary computing to strengthen cybersecurity. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2018. AISC, vol. 857, pp. 898–919. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01177-2_67

    Chapter  Google Scholar 

  10. Cambou, B., Telesca, D., Assiri, S., Garrett, M., Jain, S., Partridge, M.: TRNGS from pre-formed RERAM array. Cryptography 5(1), 8 (2021)

    Article  Google Scholar 

  11. Cambou, B.F, Quispe, R.C., Babib, B.: PUF with dissolvable conductive paths, 28 May 2020. US Patent App. 16/493,263

    Google Scholar 

  12. An Chen. Comprehensive assessment of RRAM-based PUF for hardware security applications. In: 2015 IEEE International Electron Devices Meeting (IEDM), pp. 10–7. IEEE (2015)

    Google Scholar 

  13. Korenda, A.R., Afghah, F., Cambou, B.: A secret key generation scheme for internet of things using ternary-states RERAM-based physical unclonable functions. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1261–1266. IEEE (2018)

    Google Scholar 

  14. Korenda, A.R., Assiri, S., Afghah, F., Cambou, B.: An error correction approach to memristors PUF-based key encapsulation. In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1–6. IEEE (2021)

    Google Scholar 

  15. Kumar, M.G.V., Ragupathy, U.S.: A survey on current key issues and status in cryptography. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 205–210. IEEE (2016)

    Google Scholar 

  16. Majot, A., Yampolskiy, R.: Global catastrophic risk and security implications of quantum computers. Futures 72, 17–26 (2015)

    Article  Google Scholar 

  17. Miandoab, D.G., Assiri, S., Mihaljevic, J., Cambou, B.: Statistical analysis of RERAM-PUF based keyless encryption protocol against frequency analysis attack. In: Arai, K. (ed.) FICC 2022. LNNS, vol. 439, pp. 928–940. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-98015-3_63

  18. Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Cham (2009). https://doi.org/10.1007/978-3-642-04101-3

    Book  MATH  Google Scholar 

  19. Shamsoshoara, A., Korenda, A., Afghah, F., Zeadally, S.: A survey on physical unclonable function (PUF)-based security solutions for internet of things. Comput. Netw. 183, 107593 (2020)

    Article  Google Scholar 

  20. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)

    Article  Google Scholar 

  21. Yoshimoto,Y., Katoh, Y., Ogasahara, S., Wei, Z., Kouno, K.: A RERAM-based physically unclonable function with bit error rate lt; 0.5% after 10 years at 125\(^{\circ }\)C for 40nm embedded application. In: 2016 IEEE Symposium on VLSI Technology, pp. 1–2 (2016)

    Google Scholar 

  22. Zhu, Y., Cambou, B., Hely, D., Assiri, S.: Extended protocol using keyless encryption based on memristors. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1230, pp. 494–510. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-52243-8_36

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel Aguilar Rios .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rios, M.A., Assiri, S., Cambou, B. (2022). Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF. In: Arai, K. (eds) Intelligent Computing. SAI 2022. Lecture Notes in Networks and Systems, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-10467-1_50

Download citation

Publish with us

Policies and ethics