z-logo
open-access-imgOpen Access
Application of Memristors in Hardware Security: A Current State‐of‐the‐Art Technology
Author(s) -
Lv Shiya,
Liu Jian,
Geng Zhaoxin
Publication year - 2021
Publication title -
advanced intelligent systems
Language(s) - English
Resource type - Journals
ISSN - 2640-4567
DOI - 10.1002/aisy.202000127
Subject(s) - memristor , computer science , hardware security module , randomness , encryption , cryptography , key (lock) , chaotic , state (computer science) , electronic circuit , computer hardware , embedded system , computer architecture , computer security , electronic engineering , electrical engineering , engineering , artificial intelligence , mathematics , statistics , algorithm
Memristors are widely used in hardware security applications. Research progress in memristor‐based physical unclonable functions (PUFs), random number generators (RNGs), and chaotic circuits is reviewed. To enhance device security, PUFs and RNGs apply randomness of memristors and incorporate 3D crossbars to amplify the number of challenge‐response pairs and provide proof of the destruction of the key, which enables the administrator to firmly control the device information. In addition, the image encryption technique based on the chaotic system is summarized. Furthermore, an assessment of the research advancement in PUFs, RNGs, and chaotic circuits is conducted. This Review examines the characteristics, applications, progress, and challenges of memristors in hardware security and compares the benefits and limitations of different schemes as accelerators for hardware information protection.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here