Abstract
Hardware-intrinsic security primitives employ instance-specific and process-induced variations in electronic hardware as a source of cryptographic data. Among various emerging technologies, memristors offer unique opportunities in such security applications due to their underlying stochastic operation. Here we show that the analogue tuning and nonlinear conductance variations of memristors can be used to build a basic building block for implementing physically unclonable functions that are resilient, dense, fast and energy-efficient. Using two vertically integrated 10 × 10 metal-oxide memristive crossbar circuits, we experimentally demonstrate a security primitive that offers a near ideal 50% average uniformity and diffuseness, as well as a minimum bit error rate of around 1.5 ± 1%. Readjustment of the conductances of the devices allows nearly unique security instances to be implemented with the same crossbar circuit.
This is a preview of subscription content, access via your institution
Relevant articles
Open Access articles citing this article.
-
Generative complex networks within a dynamic memristor with intrinsic variability
Nature Communications Open Access 02 October 2023
-
A memristor fingerprinting and characterisation methodology for hardware security
Scientific Reports Open Access 09 June 2023
-
Echo state graph neural networks with analogue random resistive memory arrays
Nature Machine Intelligence Open Access 13 February 2023
Access options
Access Nature and 54 other Nature Portfolio journals
Get Nature+, our best-value online-access subscription
$29.99 / 30 days
cancel any time
Subscribe to this journal
Receive 12 digital issues and online access to articles
$119.00 per year
only $9.92 per issue
Rent or buy this article
Prices vary by article type
from$1.95
to$39.95
Prices may be subject to local taxes which are calculated during checkout




References
Damiani, E., di Vimercati, S. D. C. & Samarati, P. New paradigms for access control in open environments. Proc. Fifth IEEE Int. Symp. Signal Process. Inf. Tech. https://doi.org/10.1109/ISSPIT.2005.1577155 (2005).
Konstantinou, C. et al. Cyber-physical systems: A security perspective. 2015 20th IEEE European Test Symp. (ETS) https://doi.org/10.1109/ETS.2015.7138763 (2015).
Suh, G. E. & Devadas, S. Physical unclonable functions for device authentication and secret key generation. 2007 44th ACM/IEEE Des. Autom. Conf. 9–14 (2007).
Sadeghi, A.R. & Naccache, D. Towards Hardware-Intrinsic Security: Foundations and Practice (Springer: New York, NY, 2010).
Kömmerling, O. & Kuhn, M. G. Design principles for tamper-resistant smartcard processors. Smartcard 99, 9–20 (1999).
Pappu, R., Recht, B., Taylor, J. & Gershenfeld, N. Physical one-way functions. Science 297, 2026–2030 (2002).
Tehranipoor, M. & Wang, C. Introduction to Hardware Security and Trust (Springer Science & Business Media: Berlin, 2011).
Rajendran, J. et al. Nano meets security: exploring nanoelectronic devices for security applications. Proc. IEEE 103, 829–849 (2015).
Hu, Z. et al. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes. Nat. Nanotech. 11, 559–565 (2016).
Delvaux, J. & Verbauwhede, I. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. 2013 IEEE Int. Symp. Hardware-Oriented Security Trust (HOST) https://doi.org/10.1109/HST.2013.6581579 (2013).
Herder, C., Yu, M.-D., Koushanfar, F. & Devadas, S. Physical unclonable functions and applications: a tutorial. Proc. IEEE 102, 1126–1141 (2014).
Ruhrmair, U. & Holcomb, D. E. PUFs at a glance. 2014 Des. Autom. Test Europe Conf. Exhibit. (DATE) https://doi.org/10.7873/DATE.2014.360 (2014).
Yu, M.-D. M., Sowell, R., Singh, A., M’Raïhi, D. & Devadas, S. Performance metrics and empirical results of a PUF cryptographic key generation ASIC. 2012 IEEE Int. Symp. Hardware-Oriented Security Trust (HOST) https://doi.org/10.1109/HST.2012.6224329 (2012).
Roel, M. Physically Unclonable Functions: Constructions, Properties and Applications. PhD thesis, Univ. KU Leuven (2012).
Herder III, C. H. Towards Security Without Secrets. PhD thesis, Massachusetts Institute of Technology (2016).
Kang, H., Hori, Y., Katashita, T., Hagiwara, M. & Iwamura, K. Cryptographic key generation from PUF data using efficient fuzzy extractors. 16th Int. Conf. Adv. Commun.Tech. https://doi.org/10.1109/ICACT.2014.6778915 (2014).
Lim, D. et al. Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. Syst. 13, 1200–1205 (2005).
Maes, R., Van Herrewege, A. & Verbauwhede, I. PUFKY: a fully functional PUF-based cryptographic key generator. Int. Workshop Cryptographic Hardware Embedded Syst. https://doi.org/10.1007/978-3-642-33027-8_18 (2012).
Rührmair, U. & van Dijk, M. PUFs in security protocols: attack models and security evaluations. 2013 IEEE Symp. Security Privacy https://doi.org/10.1109/SP.2013.27 (2013).
van Dijk, M. & Rührmair, U. Physical unclonable functions in cryptographic protocols: security proofs and impossibility results. IACR Cryptol. EPrint Arch. 2012, 228 (2012).
Zhang, L., Kong, Z. H. & Chang, C.-H. PCKGen: a phase change memory based cryptographic key generator. 2013 IEEE Int. Symp. Circuits Syst. (ISCAS2013) https://doi.org/10.1109/ISCAS.2013.6572128 (2013).
Ranasinghe, D. C. & Cole, P. H. Confronting security and privacy threats in modern RFID systems. 2006 Fortieth Asilomar Conf. Signals Syst. Comput. https://doi.org/10.1109/ACSSC.2006.355129 (2006).
Devadas, S. et al. Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications. 2008 IEEE Int. Conf. RFID https://doi.org/10.1109/RFID.2008.4519377 (2008).
Cole, P. H. & Ranasinghe, D. C. Networked RFID Systems and Lightweight Cryptography. Vol. 10 (Springer: Berlin, 2008).
Waser, R., Dittmann, R., Staikov, G. & Szot, K. Redox-based resistive switching memories—nanoionic mechanisms, prospects, and challenges. Adv. Mater. 21, 2632–2663 (2009).
Yang, J. J., Strukov, D. B. & Stewart, D. R. Memristive devices for computing. Nat. Nanotech. 8, 13–24 (2013).
Zhang, L., Fong, X., Chang, C.-H., Kong, Z. H. & Roy, K. Feasibility study of emerging non-volatile memory based physical unclonable functions. 2014 IEEE 6th Int. Memory Workshop (IMW) https://doi.org/10.1109/IMW.2014.6849384 (2014).
Liu, R., Wu, H., Pang, Y., Qian, H. & Yu, S. A highly reliable and tamper-resistant RRAM PUF: design and experimental validation. 2016 IEEE Int. Symp. Hardware-Oriented Security Trust (HOST) https://doi.org/10.1109/HST.2016.7495549 (2016).
Chen, A. Comprehensive assessment of RRAM-based PUF for hardware security applications. 2015 IEEE Int. Electron Dev. Meet. (IEDM) https://doi.org/10.1109/IEDM.2015.7409672 (2015).
Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015).
Rajendran, J., Rose, G. S., Karri, R. & Potkonjak, M. Nano-PPUF: a memristor-based security primitive. 2012 IEEE Comput. Soc. Annual Symp. VLSI https://doi.org/10.1109/ISVLSI.2012.40 (2012).
Chang, S. H. et al. Oxide double‐layer nanocrossbar for ultrahigh‐density bipolar resistive memory. Adv. Mater. 23, 4063–4067 (2011).
Gao, L., Chen, P.-Y., Liu, R. & Yu, S. Physical unclonable function exploiting sneak paths in resistive cross-point array. IEEE Trans. Electron. Dev. 63, 3109–3115 (2016).
Moors, M. et al. Resistive switching mechanisms on TaOx and SrRuO3 thin-film surfaces probed by scanning tunneling microscopy. ACS Nano 10, 1481–1492 (2016).
Rührmair, U. et al. Applications of high-capacity crossbar memories in cryptography. IEEE Trans. Nanotech. 10, 489–498 (2011).
Kim, J. et al. A physical unclonable function with redox-based nanoionic resistive memory. IEEE Trans. Inf. Forensics Security 13, 437–448 (2018).
Che, W., Plusquellic, J. & Bhunia, S. A non-volatile memory based physically unclonable function without helper data. 2014 IEEE/ACM Int. Conf. Comp. Aided Des. https://doi.org/10.1109/ICCAD.2014.7001345 (2014).
Rose, G. S. & Meade, C. A. Performance analysis of a memristive crossbar PUF design. 2015 52nd ACM/EDAC/IEEE Des. Autom. Conf. (DAC) https://doi.org/10.1145/2744769.2744892 (2015).
Adam, G. C. et al. 3-D memristor crossbars for analog and neuromorphic computing applications. IEEE Trans. Electron. Dev. 64, 312–318 (2017).
Alibart, F., Gao, L., Hoskins, B. D. & Strukov, D. B. High precision tuning of state for memristive devices by adaptable variation-tolerant algorithm. Nanotechnology 23, 075201 (2012).
Uddin, M., Majumder, M. B. & Rose, G. S. Robustness analysis of a memristive crossbar PUF against modeling attacks. IEEE Trans. Nanotech. 16, 396–405 (2017).
Xu, X. & Burleson, W. Hybrid side-channel/machine-learning attacks on PUFs: a new threat? 2014 Des. Autom. Test Europe Conf. Exhibit. (DATE) https://doi.org/10.7873/DATE.2014.362 (2014).
Merrikh Bayat, F. et al. Memristor-based perceptron classifier: Increasing complexity and coping with imperfect hardware. 2017 IEEE/ACM Int. Conf. Comp. Aided Des. https://doi.org/10.1109/ICCAD.2017.8203825 (2017).
Kim, K.-H. et al. A functional hybrid memristor crossbar-array/CMOS system for data storage and neuromorphic applications. Nano Lett. 12, 389–395 (2011).
Holcomb, D. E. & Fu, K. Bitline PUF: building native challenge–response PUF capability into any SRAM. Int. Workshop Cryptographic Hardware Embedded Syst. https://doi.org/10.1007/978-3-662-44709-3_28 (2014).
Acknowledgements
This work was supported by AFOSR under MURI grant FA9550-12-1-0038, ARC DP140103448 and NSF grant CCF-1528502. The authors thank A. Chen and J. Rajendran for useful discussions.
Author information
Authors and Affiliations
Contributions
H.N., O.K. and D.B.S. conceived the original concept and initiated the work. G.C.A and B.H. fabricated devices. H.N., M.P. and F.M.B. developed the characterization set-up and performed measurements. H.N., J.K. and M.R.M. performed simulations and estimated performance. H.N. and D.B.S. wrote the manuscript. All authors discussed the results.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Supplementary Information
Supplementary Sections 1–10, Supplementary Figures 1–9 and Supplementary Tables 1–3
Rights and permissions
About this article
Cite this article
Nili, H., Adam, G.C., Hoskins, B. et al. Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors. Nat Electron 1, 197–202 (2018). https://doi.org/10.1038/s41928-018-0039-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1038/s41928-018-0039-7
This article is cited by
-
Echo state graph neural networks with analogue random resistive memory arrays
Nature Machine Intelligence (2023)
-
A memristor fingerprinting and characterisation methodology for hardware security
Scientific Reports (2023)
-
Generative complex networks within a dynamic memristor with intrinsic variability
Nature Communications (2023)
-
All-in-one, bio-inspired, and low-power crypto engines for near-sensor security based on two-dimensional memtransistors
Nature Communications (2022)
-
Twin physically unclonable functions based on aligned carbon nanotube arrays
Nature Electronics (2022)