Twitter Facebook LinkedIn RSS
Welcome to the AUTM Global Technology Portal, where you can easily find the latest university technologies available for licensing worldwide.

Communicate

Reconfigurable Physically Unclonable Function (PUF) Based Security

Details

Project TitleReconfigurable Physically Unclonable Function (PUF) Based Security
Track Code28868
Websitehttps://techtransfer.universityofcalifornia.edu/NCD/28868.html?utm_source=AUTMGTP&utm_medium=webpage&utm_term=ncdid_28868&utm_campaign=TechWebsites
Short Description

Researchers at the University of California, Santa Barbara have designed a platform for highly secure and reconfigurable hardware-intrinsic security primitives, physically unclonable function (PUF), based on the emergent analog RRAM crossbar technology. These primitives have near ideal diffuseness, uniformity, and uniqueness. Its simple and low-cost design, small footprint, CMOS integration compatibility, and instance reconfigurability make this technology superior to other PUF hardware and highly suitable for security applications. Moreover, they have designed an architecture for PUFs based on analog Flash memory blocks. This architecture, based on matured integrated floating gate technology offers low-cost CMOS-compatible solutions. With flash-based memory arrays already in production and their anticipated application in computational engines, the reliable, embeddable security apparatus will be of great value. These hardware solutions have wide-ranging applications including IC identification, secure channel communication, and data encryption without the need of “key” storage in auxiliary memory, making it seemingly impenetrable from attack.

AbstractA platform for highly secure and reconfigurable hardware-intrinsic security primitives, physically unclonable function (PUF), based on the emergent analog RRAM crossbar technology.
 
TagsPhysically unclonable function, PUF, security, cryptographic, security primitives, RRAM, cmos, Semiconductors, IC identification, data encryption, indtelecom, indansens, indmicroelec, indsoftw, cyber security, other
 
Posted DateSep 8, 2017 11:55 AM

Advantages

  • Reconfigurable
  • Low design cost
  • Programmable
  • Enhanced resilience against attack
  • Can be easily integrated into existing devices

Potential Applications

  • Semiconductors
  • IC identification
  • Secure channel communication
  • Data encryption
  • Anti-counterfeiting
  • Military equipment

Additional Information

Background

The ever-expanding world of the internet and information technology has led to an increase of interconnected networks and sharing of valuable information online. As the amount of information disseminated online grows so does the need for a protected and safe way to store this information. Conventional cryptographic and “secret key” approaches are vulnerable to physical and side-channeling attacks making them unreliable security measures. Therefore, a need exists for a more dependable and impenetrable form of security.



Tech ID/UC Case

28868/2018-088-0



Related Cases

2018-088-0

Contact Information

Name : Lauren Dobis

Title :

Department :

Email : dobis@tia.ucsb.edu

Phone :

Address :

Principal Investigator

Name : Hussein Nili Ahmadabadi

Department :



Name : Zahra Fahimi

Department :



Name : Mohammad Reza Mahmoodi

Department :



Name : Dmitri Strukov

Department :

Intellectual Property