- Flash memory is now doubled as safe key storage using the concealment and revelation method
- Encryption keys hidden in view in the memory of NAND 3D standard
- Automatic learning attacks failed to guess the keys, showing true randomness and security
As the volume of digital data continues to grow with the increase in AI, cloud services and connected devices, ensure that the data has become increasingly difficult.
Traditional password -based protections are no longer enough, and although hardware security solutions, such as non -clonable physical functions (PUF) offer stronger protection, have had problems with the implementation of the real world.
Most PUF require personalized hardware and lack the ability to hide key when they are not in use, leaving the exposed systems.
Unique and unpredictable
A research team from the National University of Seoul has introduced a new hardware security approach called PUF Hidden. This method uses the Commercial Flash Nand memory, typically found in conventional storage devices, to create a safe method to store and hide encryption keys.
What distinguishes this is its ability to hide a key under user data and reveal it only when necessary. The technique was recently posted in Nature communications.
Key innovation implies a weak application of the GIDL deletion process (door -induced drainage leak). This increases the variation between memory cells, which makes the characteristics of each chip unique and unpredictable.
These variations can be used to generate PUF data that serve as a safe and inclined key.
With this approach, structural or circuit changes are not required. The method works directly with standard Flash V-Nand memory, which facilitates the scale.
This could allow security at the hardware level to be implemented in the daily consumption electronics without additional costs or complexity.
The University says that the hidden PUF approved stress tests that included wide temperature ranges and more than 10 million reading cycles. He also resisted attacks based on automatic learning, which could not predict the key beyond random divinance levels.
Impressive, the key could be hidden and revealed more than 100 times without any error, showing system stability.
Professor Jong-ho Lee, who directed the project, said: “PUF hidden stands out for its creativity and practicality, since it uses NAND NAND memory technology produced by mass without modifications.”
The main author Sung-Ho Park added: “This research is significant because it demonstrates how PUFS can be implemented using the existing flash V-Nand memory operation without altering the circuits or design. By allowing the selective exposure of the safety key, our method opens new possibilities to improve safety and memory efficiency.”
The team plans to extend this technology to other safety -centered hardware solutions, go to industries such as IoT, Mobile and Automotive Electronics.
Through Techx plane