Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA module

Rui Liu, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Recently, the resistance variability of Resistive Random Access Memory (RRAM) based array has been exploited to design a weak Physical Unclonable Function (PUF) for the cryptographic key generation. Generally, memory-based PUF is weak PUF as the challenge-response pair (CRP) space is limited by the memory capacity. In this work, we propose a design of RRAM based strong PUF for device authentication by employing Secure Hash Algorithm (SHA). The key idea is to split the challenge bits into two segments. The first segment is fed into the RRAM array and the output of the RRAM array is mixed with the second segment as the input to the SHA module, thereby significantly increasing the CRP space. To analyze the properties of the proposed strong PUF such as uniqueness and reliability, the resistance variability is experimentally measured from the fabricated 1 kb HfO2 based RRAM arrays, and the read current distribution is then modeled. The simulation shows that when the number of bits from RRAM is larger than 8 bits, the proposed PUF can present good uniqueness. In order to achieve higher security against PUF modeling attack, however, more bits from RRAM array should be feed into SHA module. With 32-bit from RRAM array, it could achieve average uniqueness ∼49.95%, uniformity of '1's ∼49.81%, diffusiveness ∼49.97% with tight distributions. The use of SHA imposes a strict requirement on the reliability, thus multiple RRAM cells are grouped and used to statistically minimize the risk of early retention failure of a single cell. On the other hand, the use of SHA provides a strong resistance against the machine learning attack as demonstrated through 3-layer multi-layer perceptron (MLP) modeling.

Original languageEnglish (US)
Title of host publicationProceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages67-72
Number of pages6
ISBN (Electronic)9781538614211
DOIs
StatePublished - Jul 2 2017
Event2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017 - Beijing, China
Duration: Oct 19 2017Oct 20 2017

Publication series

NameProceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
Volume2018-May

Other

Other2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
Country/TerritoryChina
CityBeijing
Period10/19/1710/20/17

Keywords

  • RRAM
  • SHA-256
  • hardware security
  • machine learning attack
  • reliability
  • strong PUF

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA module'. Together they form a unique fingerprint.

Cite this