Close Menu
Mobile SpecsMobile Specs

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025
    Facebook X (Twitter) Instagram
    Mobile SpecsMobile Specs
    • Home
    • 5G Phones
    • Android vs iOS
    • Brands
    • Budget Phones
    • Compare
    • Flagships
    • Gaming Phones
    • New Launches
    Mobile SpecsMobile Specs
    Home»New Launches»The new technique hides encryption keys under user data using the standard 3D Nand Flash memory
    New Launches

    The new technique hides encryption keys under user data using the standard 3D Nand Flash memory

    mobile specsBy mobile specsJuly 6, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    The new technique hides encryption keys under user data using the standard 3D Nand Flash memory
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Flash memory now doubles as a secure key storage using a hidden and legitimate method
    • Standard commercial 3D nand memory is hidden in simple look keys
    • Machine Learning Attacks failed to estimate keys, and show real random and security

    Since digital data volume is increasing with the rise of AI, cloud services, and associated devices, it has become increasingly difficult to secure the data.

    Traditional password -based reservations are no longer enough, and while hardware security solutions such as physical incredible functions (PUFS) offer strong protection, they have struggled with real -world deployment.

    Most PUFs need customs hardware and lack the ability to hide the keys when not use, exposing the system.

    You can like

    Unique and unexpected

    A research team at Seoul National University has introduced a new hardware security approach called Concellent PUF. This method uses commercial 3D nand flash memory, which is commonly found in mainstream storage devices, to develop a safe way to store and hide encryption keys.

    The thing that separates it is that the user has the ability to hide a key below the data and show it only when needed. This technique was recently published Nature communications.

    The key innovation includes the weak application of the GIDL (gate -induced drain leakage) elimination process. This promotes a variable between memory cells, making the characteristics of each chip unique and unexpected.

    These variations can be used to produce PUF data that acts as a safe, irreparable key.

    Sign up to all the high news, feedback, feedback, features and guidance in the TECH TACKANDER Pro Newsletter for your business to succeed!

    With this approach, no structural or circuit changes are needed. This method works directly with standard V-Nand Flash memory, which facilitates the scale.

    This could potentially allow hardware level safety to implement everyday consumers’ electronics without any additional cost or complexity.

    The University says the invisible PUF passed the tension tests, including temperature limits and more than 10 million reading cycles. It also fought against machine learning attacks, which could not predict the key beyond the random level.

    Inspired, the key was displayed 100 times without any mistakes, which showed the stability of the system.

    “The hidden PUF stands for its creativity and operation, as it uses a widely manufactured vertical Nand Flash memory technology without any modification,” said Professor Jong Hoi Lee, who guided the project.

    Lead author Singh Ho Park added, “This research is important because it shows how PUFS can be implemented using the existing Vand Flash memory without changing the circuit or design. The security key is to enable both the new procedure and the new method of memory.”

    The team plans to expand this technology in other security -based hardware solutions, targeting industries like IOT, mobile, and automotive electronics.

    By Tech Explore

    Hidden PUF using GIDL erasing on Weand Flash memory. (A) PUF Scheme, hiding using V-Nand Flash memory. (b) V-Nand Flash memory circuit diagram. (Image Credit: Nature Communication)

    You like too

    data encryption Flash hides keys memory Nand standard technique user
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI took the EV5 on the weekend and it is the perfect Electric SUV for families-with a big malfunction
    Next Article ‘You can’t make muscles you haven’t made’ – I’m a personal trainer, and here why I choose weightlifting before Pilates
    mobile specs
    • Website

    Related Posts

    Compare

    Adobe Acrobat Standard (2024) Overview

    December 5, 2025
    Compare

    X launched a chat app with end-to-end encryption

    November 18, 2025
    Compare

    MSI Data Mag portable SSD review

    August 29, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Compare

    Honor Magic 8 Lite Review – gsmarena.com Test

    mobile specsDecember 8, 2025
    Compare

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    mobile specsDecember 8, 2025
    Compare

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    mobile specsDecember 8, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Our Picks

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    © 2026 MobileSpecs. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.