Methods for Fast Cryptographic Key Generation from Memristor-Based Physically Unclonable Computed Functions
Description
When operating at very low power, arrays of memristors are unclonable and can be used to design cryptographic key generators and exploit the dependencies of their resistance values with the injected current. Additionally, at low power the memristors are not retaining information or acting as non-volatile memory. The difficulties of such designs include the inherent limitations behind legacy physical unclonable functions (PUFs) and the slowness to accurately measure high ephemeral resistance values in the 10 M? range. This protocol replaces the initial responses of the PUF with responses computed from analytical parameters. These parameters, which are stored in a look-up table of the server, are generated upfront during enrollment cycles from the physical parameters of memristor arrays. The protocol replaces the PUF challenges with a set of instructions also computed from the analytical parameters at the server level. They are transmitted to the client device containing the memristor array through unsecured networks. Rather than generating the PUF responses from the memristor array by rereading the ephemeral resistance values of the cells, the responses are generated by injecting small currents, typically 100 nA, and comparing the voltage across the memristor cells with the voltage across certain reference cells available in the array.
Additional information
Patent number and inventor
17/221,180
Bertrand Cambou
Potential applications
Cybersecurity applications
Benefits and advantages
These methods mitigate the challenges associated with the ephemeral properties of memristors operating at low power for use in designing key generators.
Case number and licensing status
2020-031
This invention is available for licensing.