No data available.
Please log in to see this content.
You have no subscription access to this content.
No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
The full text of this article is not currently available.
Novel secret key generation techniques using memristor devices
2.J. J. Yang, M. D. Pickett, X. Li, D. A. Ohlberg, D. R. Stewart, and R. S. Williams, “Memristive switching mechanism for metal/oxide/metal nanodevices,” Nature nanotechnology 3, 429–433 (2008).
3.D. B. Strukov, J. L. Borghetti, and R. S. Williams, “Coupled ionic and electronic transport model of thin-film semiconductor memristive behavior,” small 5, 1058–1063 (2009).
6.J. Strunk, W. C. Vining, and A. T. Bell, “A study of oxygen vacancy formation and annihilation in submonolayer coverages of tio2 dispersed on mcm-48,” The Journal of Physical Chemistry C 114, 16937–16945 (2010).
7.M. D. Pickett, D. B. Strukov, J. L. Borghetti, J. J. Yang, G. S. Snider, D. R. Stewart, and R. S. Williams, “Switching dynamics in titanium dioxide memristive devices,” Journal of Applied Physics 106, 074508 (2009).
8.A. Uchida, P. Davis, and S. Itaya, “Generation of information theoretic secure keys using a chaotic semiconductor laser,” Applied physics letters 83, 3213–3215 (2003).
9.Y. Yao, Y. Liu, S. Dong, Y. Yin, S. Yang, and X. Li, “Multi-state resistive switching memory with secure information storage in au/bife0. 95mn0. 05o3/la5/8ca3/8mno3 heterostructure,” Applied Physics Letters 100, 193504 (2012).
10.M. Noman, W. Jiang, P. A. Salvador, M. Skowronski, and J. A. Bain, “Computational investigations into the operating window for memristive devices based on homogeneous ionic motion,” Applied Physics A 102, 877–883 (2011).
11.N. Hashem and S. Das, “Switching-time analysis of binary-oxide memristors via a nonlinear model,” Applied Physics Letters 100, 262106 (2012).
13.J. Rajendran, G. S. Rose, R. Karri, and M. Potkonjak, “Nano-ppuf: A memristor-based security primitive,” VLSI (ISVLSI), 2012 IEEE Computer Society Annual Symposium on (IEEE, 2012), pp. 84–87.
14.G. S. Rose, J. Rajendran, N. McDonald, R. Karri, M. Potkonjak, and B. Wysocki, “Hardware security strategies exploiting nanoelectronic circuits,” in Design Automation Conference (ASP-DAC), 2013 18th Asia and South Pacific (IEEE, 2013), pp. 368–372.
16.P. Koeberl, Ü. Kocabaş, and A.-R. Sadeghi, “Memristor pufs: a new generation of memory-based physically unclonable functions,” in Proceedings of the Conference on Design, Automation and Test in Europe (EDA Consortium, 2013), pp. 428–431.
17.J. B. Wendt and M. Potkonjak, “The bidirectional polyomino partitioned ppuf as a hardware security primitive,” in Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE (IEEE, 2013), pp. 257–260.
18.S. Kannan, N. Karimi, O. Sinanoglu, and R. Karri, “Security vulnerabilities of emerging nonvolatile main memories and countermeasures,” Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on 34, 2–15 (2015).
19.H. Abunahla, D. Homouz, Y. Halawani, and B. Mohammad, “Modeling and device parameter design to improve reset time in binary-oxide memristors,” Applied Physics A 117, 1019–1023 (2014).
20.M. Curtin, Brute Force (Springer, 2005).
21.D. R. Stinson, Cryptography: theory and practice (CRC press, 2005).
22.A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography (CRC press, 1996).
23.H. C. Van Tilborg and S. Jajodia, Encyclopedia of cryptography and security (Springer Science & Business Media, 2011).
Article metrics loading...
This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.
Full text loading...
Most read this month