Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of mo...
Gespeichert in:
Veröffentlicht in: | ETRI journal 2023, 45(2), , pp.346-357 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min‐entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high‐entropy requirements, such as cryptographic key generation for IoT devices. |
---|---|
ISSN: | 1225-6463 2233-7326 |
DOI: | 10.4218/etrij.2021-0455 |