2022
DOI: 10.4218/etrij.2021-0455
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and characterization of flash‐based hardware security primitives for cryptographic key generation

Abstract: Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off‐the‐shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware‐based fixed random bit generator for use in security applications, such as cryptographic key g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…The road map to security devices with the unique features of post-silicon devices has been discussed, along with the most recent design strategies used by designers to address security threats, vulnerabilities, and their solutions [13]- [16]. Security experts have been working incredibly hard to create unique hardware security techniques for all various types of abovelisted attacks [17]- [22].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The road map to security devices with the unique features of post-silicon devices has been discussed, along with the most recent design strategies used by designers to address security threats, vulnerabilities, and their solutions [13]- [16]. Security experts have been working incredibly hard to create unique hardware security techniques for all various types of abovelisted attacks [17]- [22].…”
Section: Literature Reviewmentioning
confidence: 99%
“…For anti-counterfeiting purposes, PUFs generate distinctive identifiers for each device, which can be verified by the manufacturer or end user, effectively thwarting counterfeit operations [16]. PUFs also excel in key storage and management as they can securely house cryptographic keys without relying on external memory [17,18]. These PUF-generated keys find application in encryption, decryption, and authentication processes.…”
Section: Introductionmentioning
confidence: 99%