Abstract

Schemes generating cryptographic keys from arrays of pre-formed Resistive Random Access (ReRAM) cells, called memristors, can also be used for the design of fast true random number generators (TRNG’s) of exceptional quality, while consuming low levels of electric power. Natural randomness is formed in the large stochastic cell-to-cell variations in resistance values at low injected currents in the pre-formed range. The proposed TRNG scheme can be designed with three interconnected blocks: (i) a pseudo-random number generator that acts as an extended output function to generate a stream of addresses pointing randomly at the array of ReRAM cells; (ii) a method to read the resistance values of these cells with a low injected current, and to convert the values into a stream of random bits; and, if needed, (iii) a method to further enhance the randomness of this stream such as mathematical, Boolean, and cryptographic algorithms. The natural stochastic properties of the ReRAM cells in the pre-forming range, at low currents, have been analyzed and demonstrated by measuring a statistically significant number of cells. Various implementations of the TRNGs with ReRAM arrays are presented in this paper.

Highlights

  • Random numbers play an essential function in cyber security infrastructures

  • The randomness of the physical parameters that are exploited for the design of TRNGs, such as the cell-to-cell microscopic variations created during fabrication, can be used to design physical unclonable functions (PUFs) that generate cryptographic keys from

  • Even if we do not have any analysis showing that randomness is lower with smaller arrays, we developed additional schemes showing that randomness is lower with smaller arrays, we developed additional schemes that should be useful to maintain the performance of the TRNGs

Read more

Summary

Introduction

Random numbers play an essential function in cyber security infrastructures. They are absolutely critical in encryption, but are required in a variety of security scenarios: Key generation for various algorithms (symmetric, asymmetric, MACs) and protocols (SSL/TLH, SSH, WiFi, LTE, IPsec, etc.):. A high quality, hardware-based random number generator is considered to be fundamental for delivering the true randomness required for a high level of information security. The TRNGs are exploiting the natural sources of randomness that are observed in such pre-forming ranges, while making side channel attacks more difficult by operating well below the electrical noise levels. (Section 3): In preparation of the design of the TRNGs, this section presents experimental results showing the randomness of ReRAM arrays operating in the pre-forming range. (Section 5): We propose the addition of post-processing operations, such as the XORing of portions of the random numbers, to further enhance the randomness of the TRNGs. the experimental analysis demonstrates that when the natural randomness of pre-formed ReRAM-based TRNGs is good enough, such operations are not needed

PRNGs versus TRNGs
Memory-Based TRNGs
PUFs for the Design of TRNGs
Variations in Resistance Value Due to the Injection Small Electric Currents
Cell-to-cell
Effect
Design ofThe
Block diagram of TRNG the TRNG based on pre-formed
1: The median scheme as described in in detail in Section
Version 2
1: Design of TRNGs the Median Scheme
We studied variations dom numbers from pre‐formed
23: Display TRNG
BlockFigure diagram of adiagram pairingofscheme pre-formed
23: Display their
NIST-based
NIST-based statistical of the stream directly generatedby byTRNGs
Combining TRNGs with Additional Schemes to Enhance Randomness
1: To generate streams of random numbers from the combination of shake
3: Generate
Experimental Analysis
Findings
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.