Physically unclonable cryptographic primitives using self-assembled carbon nanotubes.

Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

[1]  Garrett S. Rose,et al.  A write-time based memristive PUF for hardware security applications , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[2]  David Naccache,et al.  Towards Hardware-Intrinsic Security - Foundations and Practice , 2010, Information Security and Cryptography.

[3]  G. Whitesides,et al.  Foldable Printed Circuit Boards on Paper Substrates , 2010 .

[4]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[5]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[6]  Tony F. Wu,et al.  Monolithic 3D integration of logic and memory: Carbon nanotube FETs, resistive RAM, and silicon FETs , 2014, 2014 IEEE International Electron Devices Meeting.

[7]  Sheng Wang,et al.  Temperature Performance of Doping‐Free Top‐Gate CNT Field‐Effect Transistors: Potential for Low‐ and High‐Temperature Electronics , 2011 .

[8]  Changhuei Yang,et al.  Physical key-protected one-time pad , 2013, Scientific Reports.

[9]  Alberto Valdes Garcia,et al.  Graphene radio frequency receiver integrated circuit , 2014, Nature Communications.

[10]  Miodrag Potkonjak,et al.  Nanotechnology-based trusted remote sensing , 2011, 2011 IEEE SENSORS Proceedings.

[11]  Field-effect transistors assembled from functionalized carbon nanotubes. , 2006, Nano letters.

[12]  Cherie R. Kagan,et al.  Chemically assisted directed assembly of carbon nanotubes for the fabrication of large-scale device arrays. , 2007, Journal of the American Chemical Society.

[13]  Miodrag Potkonjak,et al.  Robust and flexible FPGA-based digital PUF , 2014, 2014 24th International Conference on Field Programmable Logic and Applications (FPL).

[14]  Frederik Armknecht,et al.  Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions , 2009, ASIACRYPT.

[15]  Paolo Villoresi,et al.  Random bits, true and unbiased, from atmospheric turbulence , 2013, Scientific Reports.

[16]  Bora Yoon,et al.  Recent functional material based approaches to prevent and detect counterfeiting , 2013 .

[17]  Gang Xiong,et al.  Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.

[18]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[19]  A. Uchida,et al.  Fast physical random bit generation with chaotic semiconductor lasers , 2008 .

[20]  P. H. Lau,et al.  Fully printed, high performance carbon nanotube thin-film transistors on flexible substrates. , 2013, Nano letters.

[21]  I. Kanter,et al.  An optical ultrafast random bit generator , 2010 .

[22]  W. Haensch,et al.  Carbon nanotube complementary logic based on Erbium contacts and self-assembled high purity solution tubes , 2013, 2013 IEEE International Electron Devices Meeting.

[23]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[24]  Miodrag Potkonjak,et al.  Nano-PPUF: A Memristor-Based Security Primitive , 2012, 2012 IEEE Computer Society Annual Symposium on VLSI.

[25]  Jangbae Kim,et al.  Anti-counterfeit nanoscale fingerprints based on randomly distributed nanowires , 2014, Nanotechnology.

[26]  Yong-Young Noh,et al.  Synthesis of ultrathin polymer insulating layers by initiated chemical vapour deposition for low-power soft electronics. , 2015, Nature materials.

[27]  Srinivas Devadas,et al.  Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.

[28]  W. Haensch,et al.  High-density integration of carbon nanotubes via chemical self-assembly. , 2012, Nature nanotechnology.

[29]  Ingrid Verbauwhede,et al.  Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.

[30]  Stefan Katzenbeisser,et al.  PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.

[31]  Ali Afzali,et al.  High purity isolation and quantification of semiconducting carbon nanotubes via column chromatography. , 2013, ACS nano.

[32]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[33]  Wei Wu,et al.  A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions , 2013, INTRUST.

[34]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[35]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[36]  Wilfried Haensch,et al.  Wafer scale fabrication of carbon nanotube FETs with embedded poly-gates , 2010, 2010 International Electron Devices Meeting.

[37]  Ken Mai,et al.  An efficient reliable PUF-based cryptographic key generator in 65nm CMOS , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[38]  Miodrag Potkonjak,et al.  Digital PUF using intentional faults , 2015, Sixteenth International Symposium on Quality Electronic Design.

[39]  Miodrag Potkonjak,et al.  Hardware security strategies exploiting nanoelectronic circuits , 2013, 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC).

[40]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[41]  Feng Ding,et al.  Chirality-specific growth of single-walled carbon nanotubes on solid alloy catalysts , 2014, Nature.

[42]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[43]  Deji Akinwande,et al.  Two-dimensional flexible nanoelectronics , 2014, Nature Communications.

[44]  Joseph Wang,et al.  Orthogonal multi-readout identification of alloy nanowire barcodes. , 2009, Journal of the American Chemical Society.