Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function
Garrard, Hardy, daCunha et al.
Physically Unclonable Functions (PUFs) are a promising solution for identity verification and asymmetric encryption. In this paper, a new Resistive Random Access Memory (ReRAM) PUF-based protocol is presented to create a physical ReRAM PUF with a large challenge space. This protocol uses differential reads from unformed ReRAM as the method for response generation. Lastly, this paper also provides an experimental hardware demonstration of this protocol on a Physical ReRAM device, along with providing notable results as a PUF, with excellent performance characteristics.
academic
Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function
Physically Unclonable Functions (PUFs) represent a promising solution for authentication and asymmetric encryption. This paper proposes a novel protocol based on Resistive Random Access Memory (ReRAM) PUF for creating physical ReRAM PUFs with large challenge spaces. The protocol employs differential reading of unformed ReRAM as the response generation method. The paper also provides experimental hardware demonstration of the protocol on physical ReRAM devices, demonstrating excellent performance characteristics as a PUF.
Modern secure communication requires reliable authentication and encryption mechanisms. Traditional public-key cryptographic systems depend on secure distribution and storage of private keys; however, digital keys are susceptible to copying and leakage, and are difficult to reissue once compromised.
Design a strong ReRAM-based PUF system where input is a challenge byte stream and output is the corresponding unique response byte stream, requiring large challenge space, low bit error rate, and strong security.
Challenge Generation Flow:
1. Generate initial data using random bytes and cryptographic hash via SHA256
2. Parse into address pair pool (approximately 1.5× target key size)
3. Filter high standard deviation cells
4. Verify cell pair differences are sufficiently large to produce repeatable responses
5. Generate stability mask marking unstable cells
Response Generation Flow:
1. Receive random bytes and stability mask
2. Regenerate address pairs and apply mask filtering
3. Perform differential reading on dual ReRAM chips
4. Condition signal through analog circuit and provide offset
5. Analog comparator produces single-bit response
6. Concatenate all bits and hash before returning
This paper cites 28 relevant references covering multiple domains including PUF technology, ReRAM devices, and cryptographic protocols, providing a solid theoretical foundation for the research.
Overall Assessment: This is a high-quality hardware security research paper that proposes an innovative ReRAM PUF solution and validates the method's effectiveness through complete hardware experiments. The paper demonstrates excellent performance in technical innovation, experimental verification, and practical value, making important contributions to PUF technology development.