On the Hardware Implementation of MRAM Physically Unclonable Function

被引:10
|
作者
Chen, Yu-Sheng [1 ]
Wang, Ding-Yeong [1 ]
Hsin, Yu-Chen [1 ]
Lee, Kai-Yu [1 ]
Chen, Guan-Long [1 ]
Yang, Shan-Yi [1 ]
Lee, Hsin-Han [1 ]
Chang, Yao-Jen [1 ]
Wang, I-Jung [1 ]
Wang, Pei-Hua [1 ]
Wu, Chih-I [1 ]
Tang, D. D. [1 ]
机构
[1] Ind Technol Res Inst, Elect & Optoelect Res Lab, Hsinchu 310, Taiwan
关键词
MRAM; physically unclonable function (PUF); security;
D O I
10.1109/TED.2017.2755867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrinsic properties of magnetic tunnel junctions (MTJs) are exploited for low-power security electronics. The combination of: 1) fast and nonvolatile storage; 2) stochastic nature of subcritical switching; and 3) random variation in the magnetic anisotropy of MTJ make MRAM array ideal for implementing physically unclonable function (PUF). We develop two bit-pattern randomization procedures, one of which can be exercised at wafer level in process line, while the other can be completed in the in-line tester. The procedures generate unpredictable and unclonable bit patterns in a spin-transfer torque (STT)-MRAM array and store them securely in the array. We show the resistance of MTJ is stable through rounds of thermal baking, the readback from the PUF shows no ambiguity from 25 degrees C to 75 degrees C. A single embedded STT-MRAM PUF can cover many needs of security electronics.
引用
收藏
页码:4492 / 4495
页数:4
相关论文
共 50 条
  • [41] Simulation of physically unclonable function based on disordered photonic structure
    Qian Li
    Feiliang Chen
    Mo Li
    Heng Long
    Peng Sun
    Pidong Wang
    Yao Yao
    Jian Zhang
    Optical and Quantum Electronics, 2017, 49
  • [42] Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions
    Chatterjee, Urbi
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020, 2020, : 217 - 221
  • [43] Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
    Beckmann, Nathan
    Potkonjak, Miodrag
    INFORMATION HIDING, 2009, 5806 : 206 - +
  • [44] Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications
    Divyanshu, Divyanshu
    Kumar, Rajat
    Khan, Danial
    Amara, Selma
    Massoud, Yehia
    IEEE ACCESS, 2022, 10 : 93029 - 93038
  • [45] Cloning Physically Unclonable Functions
    Helfmeier, Clemens
    Boit, Christian
    Nedospasov, Dmitry
    Seifert, Jean-Pierre
    2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 1 - 6
  • [46] Physically Unclonable Digital ID
    Choi, Sung
    Zage, David
    Choe, Yung Ryn
    Wasilow, Brent
    2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 105 - 111
  • [47] On the Entropy of Physically Unclonable Functions
    Rioul, Olivier
    Sole, Patrick
    Guilley, Sylvain
    Danger, Jean-Luc
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2928 - 2932
  • [48] Reliability Analysis and Performance Evaluation of STT-MRAM-Based Physical Unclonable Function
    Wang, You
    Wang, Hanchen
    Zhao, Weisheng
    Cai, Hao
    SPIN, 2020, 10 (02)
  • [49] Physically unclonable function-based security and privacy in RFID systems
    Bolotnyy, Leonid
    Robins, Gabriel
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 211 - +
  • [50] A Detailed Review on Physical Unclonable Function Circuits for Hardware Security
    Puttananjegowda, Kavyashree
    Thomas, Sylvia
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 609 - 612