Vendor: Crossbar Category: Key Storage

ReRAM Secure Keys

Background: Attacks on electronic devices and systems such as IOT endpoints, computers, medical devices and infrastructure are on…

Overview

Background: Attacks on electronic devices and systems such as IOT endpoints, computers, medical devices and infrastructure are on the rise. These attacks not only pose information security and safety hazards to companies and individuals, but also counterfeiting risks to brand name products. To resist such attacks and maintain secure communications, computing and control, new devices are implementing security which depend upon cryptographic “keys”. These keys are used to encrypt/decrypt data as well as create and verify digital signatures. Cryptographic keys are commonly referred to as a “physical unclonable function”, or PUF keys. These keys act as a secret “digital fingerprint” providing a set of random-unique identifying numbers for a specific device that cannot be easily observed, deciphered or copied, preventing an attacker from impersonating a valid device. PUF keys are often 256 bits in length employed to secure and unlock the operation of devices by approved users. The foundation for the secure operation of computing systems is often referred to as “root of trust” which typically utilizes a challenge-response method of authentication. For higher levels of security, root of trust keys are primarily implemented within integrated circuit semiconductor hardware.

While CrossBar’s ReRAM technology has been traditionally utilized for non-volatile memory, the company has recently introduced its unique ReRAM cell technology for the novel use as cryptographic keys for the secure operation of electronic devices and systems.

Advantages of ReRAM PUF: While there are numerous technologies capable of being used as PUF keys, the most common hardware approach available today is to exploit the randomness characteristics of semiconductor SRAM memory (Static Random Access Memory). Unfortunately, SRAM PUF key technology has numerous drawback limiting its level of security and effectiveness as noted in its:

* Lower levels of key randomness,
* High bit error rates,
* Limited tamper and side-channel resistance and
* Longer sensing times.

In contrast, CrossBar’s latest ReRAM PUF cryptographic key technology is enabling a new class of secure devices and systems, addressing many of the issues associated with SRAM PUF. CrossBar’s ReRAM based cryptographic keys have a very high level of randomness, extremely low bit error rate, resistance to invasive attacks and the capability of handling a broad set of environmental characteristics such as temperature, supply voltage and electromagnetic interference due to the inherent physical characteristics of the Resistive RAM technology.

CrossBar’s new ReRAM PUF technology is an ideal candidate for applications requiring both high security (PUF cryptographic keys) and efficient non-volatile memory embedded in semiconductors, which is especially important at foundry nodes less than 28nm where embedded NVM memory (flash memory) is not typically available.

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
ReRAM Secure Keys
Vendor
Crossbar

Provider

Crossbar
HQ: USA
Crossbar is the leader in ReRAM technology, enabling kilobytes to terabytes of always-on data storage to be embedded into any processor, microcontroller, FPGA or as a standalone memory chip. Crossbar ReRAM lets designers rethink the compute/storage paradigm, free from the constraints of traditional flash and DRAM memories. From “persistent memory” that brings data closer to CPU to “cognitive memory” that enables in-memory computing without a host CPU, ReRAM is ushering in a new era of data storage and processing for both edge and cloud computing.

Learn more about Key Storage IP core

OTP for DCP Key Storage

Non-volatile storage of encryption keys is an ideal way to securely implement DCP in a variety of electronic devices. However, not all non-volatile memory (NVM) technologies are suited for these applications. This paper will review some available NVM alternatives for DCP-enabled products and describe an innovative logic NVM IP technology that meets the diverse requirements for encryption key storage.

How to design secure SoCs, Part II: Key Management

Have you ever wondered how secure critical systems, like medical devices, aerospace systems or autonomous cars, really are when it comes to data protection? One point of the answer lies in effective and robust key management. Cryptographic keys are the digital secrets underpinning device identity, data confidentiality, secure communication, and overall system trustworthiness.

How to Elevate RRAM and MRAM Design Experience to the Next Level

This article will explore the potential advantages of RRAM and MRAM in various applications and elucidate why such new technologies are imperative to address future memory demands, as well as some challenges designers may encounter in the implementation.

Understanding Physical Unclonable Function (PUF)

A growing number of ASICs, microcontrollers and SoCs embed hardware cryptographic accelerators or software cryptographic libraries. The emergence of the Internet of Things (IoT) will call for an even faster adoption. We now can talk about cryptography pervasion.

Frequently asked questions about Key Storage IP cores

What is ReRAM Secure Keys?

ReRAM Secure Keys is a Key Storage IP core from Crossbar listed on Semi IP Hub.

How should engineers evaluate this Key Storage?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Key Storage IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP