A provable key destruction scheme based on memristive crossbar arrays

  • Jiang H
  • Li C
  • Zhang R
  • et al.
N/ACitations
Citations of this article
74Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Digital keys are commonly used in today’s hardware security systems. However, the provable destruction of these keys after use remains a challenging problem. Most security primitives built using traditional complementary metal–oxide–semiconductor transistors are not well suited to address this issue because of their volatility and unreliability at small scales. Here we show that the unique physical fingerprint of a 128 × 64 hafnium oxide memristor crossbar array integrated with transistors is capable of provable key destruction. The fingerprint is extracted by comparing the conductance of neighbouring memristors, and it can be revealed only if a digital key stored on the same array is erased. On the basis of this provable key destruction technique, we propose a protocol for logic locking/unlocking that can support secure outsourcing of integrated circuit manufacturing. By leveraging the unique properties of memristors, including reconfigurability and variability, our chip demonstrates the integration of security, memory and computing functionalities into the same circuits, and could be used to develop more secure, compact and efficient memristive hardware systems.

Cite

CITATION STYLE

APA

Jiang, H., Li, C., Zhang, R., Yan, P., Lin, P., Li, Y., … Xia, Q. (2018). A provable key destruction scheme based on memristive crossbar arrays. Nature Electronics, 1(10), 548–554. https://doi.org/10.1038/s41928-018-0146-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free