Next Article in Journal
Robust Secure Authentication and Data Storage with Perfect Secrecy
Previous Article in Journal
Can Ternary Computing Improve Information Assurance?
Previous Article in Special Issue
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise

An Overview of DRAM-Based Security Primitives

Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, 64293 Darmstadt, Germany
Department of Electrical and Computer Engineering, University of Connecticut, 371 Fairfield Way, U-4157, Storrs, CT 06269-4157, USA
School of Engineering, San Francisco State University, 1600 Holloway Avenue, San Francisco, CA 94132, USA
Author to whom correspondence should be addressed.
Cryptography 2018, 2(2), 7;
Received: 25 February 2018 / Revised: 24 March 2018 / Accepted: 26 March 2018 / Published: 28 March 2018
(This article belongs to the Special Issue PUF-Based Authentication)
Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT), as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance. View Full-Text
Keywords: dynamic random access memory (DRAM); physical unclonable function (PUF); true random number generator (TRNG); security primitive; overview dynamic random access memory (DRAM); physical unclonable function (PUF); true random number generator (TRNG); security primitive; overview
Show Figures

Figure 1

MDPI and ACS Style

Anagnostopoulos, N.A.; Katzenbeisser, S.; Chandy, J.; Tehranipoor, F. An Overview of DRAM-Based Security Primitives. Cryptography 2018, 2, 7.

AMA Style

Anagnostopoulos NA, Katzenbeisser S, Chandy J, Tehranipoor F. An Overview of DRAM-Based Security Primitives. Cryptography. 2018; 2(2):7.

Chicago/Turabian Style

Anagnostopoulos, Nikolaos A., Stefan Katzenbeisser, John Chandy, and Fatemeh Tehranipoor. 2018. "An Overview of DRAM-Based Security Primitives" Cryptography 2, no. 2: 7.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop