Abstract

Process variations in the manufacturing of digital circuits can be leveraged to design Physical Unclonable Functions (PUFs) that are extensively employed in hardware-based security. Different PUFs based on Magnetic Random-Access-Memory (MRAM) devices have been studied and proposed in the literature. However, most of these studies have been simulation-based, which do not fully capture the physical reality. We present experimental results on a PUF implemented on dies fabricated with a type of the MRAM technology namely Thermally-Assisted-Switching MRAM (TAS-MRAM). To the best of our knowledge, this is the first experimental validation of a TAS-MRAM-based PUF. We demonstrate how voltage values used for writing in the TAS-MRAM cells can make stochastic behaviors required for PUF design. The analysis of the obtained results provides some preliminary findings on the practical application of TAS-MRAM-based PUFs in authentication protocols. Besides, the results show that for key-generation protocols, one of the standard error correction methods should be employed if the proposed PUF is used.

Highlights

  • Physical unclonable functions (PUFs) are primitive and essential circuitry components for hardware-based security

  • The measured quality metrics and analysis results in this study provide some preliminary findings showing that TAS-Magnetic Random-Access-Memory (MRAM) can be used in authentication or key-generation protocols instead of Static RAM (SRAM) PUFs

  • In this work, practical experiments are performed on fabricated TAS-MRAM dies

Read more

Summary

Introduction

Physical unclonable functions (PUFs) are primitive and essential circuitry components for hardware-based security. The word unclonable in the term PUF refers to the most important property of such circuits It suggests the difficulty of fabricating a circuit or developing an algorithm able to generate the same inputs/outputs of PUF. Weak PUFs employed within IoT devices have at least one unclonable output, the so-called response, which is unique per each fabricated device (PUF instance) while applying an identical challenge [2], [3]. They can be utilized as the device ID, secret authentication signature, or secret cryptographic key [13]. A large number of challenge-response pairs (CRPs) in strong PUFs have enough entropy to be able to replace Hardware Security Modules in Public Key Infrastructure [8], [14]

Objectives
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.