With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are significant. For the design of secure systems, physical unclonable function (PUF) and true random number generator (TRNG) are critical hardware security primitives for security applications. This paper proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure. Firstly, two techniques to implement the TRNG in the RRAM crossbar are presented based on write-back and 50% switching probability pulse. The randomness of the proposed TRNGs is evaluated using the NIST test suite. Next, an architecture to implement the PUF in the RRAM crossbar is presented. The initial entropy source for the PUF is used from TRNGs, and challenge-response pairs (CRPs) are collected. The proposed PUF exploits the device variations and sneak-path current to produce unique CRPs. We demonstrate, through extensive experiments, reliability of 100%, uniqueness of 47.78%, uniformity of 49.79%, and bit-aliasing of 48.57% without any post-processing techniques. Finally, the design is compared with the literature to evaluate its implementation efficiency, which is clearly found to be superior to the state-of-the-art.
翻译:随着电子装置的迅速发展,这些装置的安全和隐私方面是显著的。对于安全系统的设计而言,物理上无法调的功能(PUF)和真正的随机数字生成器(TRNG)是安全应用的关键硬件安全原始物。本文件建议在RRAM十字路口结构上实施PUF和TRNG的新做法。首先,在RRAM十字路口实施TRNG的两种技术基于写回和50%转换概率脉冲。拟议TRNG的随机性正在使用NIST测试套件进行评估。接下来,提出了在RRAM交叉栏中实施PUF的架构。PUF的初始灵敏源来自TRNGs,并收集了挑战响应配对。拟议的PUF利用设备变异和悄悄流生成独特的CRP。我们通过广泛的实验,展示了100%的可靠性、47.78%的独特性、49.79%的统一性以及48.57%的比喻。最后,在没有任何后处理技术的情况下,将PUF的初始源源源源源源源使用于TRNGS,并与高级应用相比,我们发现其设计与高效率。