mrPUF: A Novel Memristive Device Based Physical Unclonable Function

Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide higher level security as a hardware security primitive. Notably PUFs are an

  • PDF / 1,030,409 Bytes
  • 21 Pages / 439.37 x 666.142 pts Page_size
  • 52 Downloads / 206 Views

DOWNLOAD

REPORT


School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA 5005, Australia {yansong.gao,said.alsarawi,derek.abbott}@adelaide.edu.au 2 Auto-ID Labs, School of Computer Science, The University of Adelaide, Adelaide, SA 5005, Australia [email protected] 3 Functional Materials and Microsystems Research Group, School of Electrical and Computer Engineering, Royal Melbourne Institute of Technology, Melbourne, VIC 3001, Australia [email protected]

Abstract. Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide higher level security as a hardware security primitive. Notably PUFs are an emerging and promising solution for establishing trust in an embedded system with low overhead with respect to energy and area. Most current PUF designs traditionally focus on exploiting process variations in CMOS (Complementary Metal Oxide Semiconductor) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper we exploit the extremely large information density available in the nanocrossbar architecture and the large resistance variations of memristors to develop on-chip memristive device based PUF (mrPUF). Our proposed architecture demonstrates good uniqueness, reliability and improved number of challenge-response pairs (CRPs). The proposed mrPUF is validated using nanodevices characteristics obtained from experimental data and extensive simulations. In addition, the performance of our mrPUF is compared with existing memristor based PUF architectures. Furthermore, we analyze and demonstrate the improved security with respect to model building attacks by expounding upon the inherent nature of nanocrossbar arrays where we use the independence between nanocrossbar columns to generate responses to challenges. Keywords: Physical unclonable function · PUFs · Hardware security Memristor · Nanocrossbar · Model building attack

c Springer International Publishing Switzerland 2015  T. Malkin et al. (Eds.): ACNS 2015, LNCS 9092, pp. 595–615, 2015. DOI: 10.1007/978-3-319-28166-7 29

·

596

1

Y. Gao et al.

Introduction

Modern security systems establish the authenticity of products or identity of users based on the principle of protecting ‘keys’ required for securing systems and allowing secret key to be obtained solely by authorized participants. However, developments in invasive and non-invasive physical tampering methods such as micro-probing, laser cutting, and power analysis and monitoring have made it possible to extract digitalized secret information from integrated circuits (ICs), and consequently compromising conditional access systems by using illegal copies of the secret information. Tamper proofing techniques used in smartcards to protect the secret keys such as cutting power or tripping tamper-sensitive circuitry that lea