Hardware Implementation of Keyless Encryption Scheme for Internet of Things Based on Image of Memristors

The Internet of Things (IoT) is rapidly increasing the number of connected devices. This causes new concerns towards solutions for authenticating numerous IoT devices. Most of these devices are resource-constrained. Therefore, the use of long-secret keys, in traditional cryptography schemes can be hard to implement. Also, the key generation, distribution, and storage are very complex. Moreover, the goal of many reported cyber-attacks is accessing the key. Therefore, researchers have shown an increased interest in designing keyless encryption schemes recently. In this report, we are going to explain the details of the implementation of the keyless protocol by taking advantage of known technology modules such as microcontrollers (MCU), and hash functions. Physical Unclonable Functions (PUFs) have been used in many cryptographic applications such as Password Management Systems, key exchange, Key Generation. In this report, we are going to explain the details of the hardware implementation of keyless encryption in the MCU. Different kinds of memristors have been used in the past. In this work, a look-up-table containing memristor cells value at the various current levels is used since the physical component is unavailable yet. The hardware that is used to implement the system is an evaluation-board of SAMV71 MCU, which is used to implement the control system and hardware hashing.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 7

research
04/10/2023

A Deep Analysis of Hybrid-Multikey-PUF

Unique key generation is essential for encryption purposes between Inter...
research
06/03/2020

Implementation of password manager with sram-based physical unclonable function

Hacking password databases is one of the most frequently reported cyber-...
research
06/14/2018

Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices

In recent years, due to the trend in globalization, system integrators h...
research
05/26/2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

The Global Wearable market is anticipated to rise at a considerable rate...
research
11/29/2021

Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen

Data protection is a severe constraint in the heterogeneous IoT era. Thi...
research
10/07/2022

Physics inspired compact modelling of BiFeO_3 based memristors for hardware security applications

With the advent of the Internet of Things, nanoelectronic devices or mem...
research
10/14/2019

On the reliability of computational chaos-based cryptography for information exchange

This paper investigates the use of dynamical chaotic systems to encrypt ...

Please sign up or login with your details

Forgot password? Click here to reset