- Flash memory now doubles as a secure key storage using a hidden and legitimate method
- Standard commercial 3D nand memory is hidden in simple look keys
- Machine Learning Attacks failed to estimate keys, and show real random and security
Since digital data volume is increasing with the rise of AI, cloud services, and associated devices, it has become increasingly difficult to secure the data.
Traditional password -based reservations are no longer enough, and while hardware security solutions such as physical incredible functions (PUFS) offer strong protection, they have struggled with real -world deployment.
Most PUFs need customs hardware and lack the ability to hide the keys when not use, exposing the system.
You can like
Unique and unexpected
A research team at Seoul National University has introduced a new hardware security approach called Concellent PUF. This method uses commercial 3D nand flash memory, which is commonly found in mainstream storage devices, to develop a safe way to store and hide encryption keys.
The thing that separates it is that the user has the ability to hide a key below the data and show it only when needed. This technique was recently published Nature communications.
The key innovation includes the weak application of the GIDL (gate -induced drain leakage) elimination process. This promotes a variable between memory cells, making the characteristics of each chip unique and unexpected.
These variations can be used to produce PUF data that acts as a safe, irreparable key.
With this approach, no structural or circuit changes are needed. This method works directly with standard V-Nand Flash memory, which facilitates the scale.
This could potentially allow hardware level safety to implement everyday consumers’ electronics without any additional cost or complexity.
The University says the invisible PUF passed the tension tests, including temperature limits and more than 10 million reading cycles. It also fought against machine learning attacks, which could not predict the key beyond the random level.
Inspired, the key was displayed 100 times without any mistakes, which showed the stability of the system.
“The hidden PUF stands for its creativity and operation, as it uses a widely manufactured vertical Nand Flash memory technology without any modification,” said Professor Jong Hoi Lee, who guided the project.
Lead author Singh Ho Park added, “This research is important because it shows how PUFS can be implemented using the existing Vand Flash memory without changing the circuit or design. The security key is to enable both the new procedure and the new method of memory.”
The team plans to expand this technology in other security -based hardware solutions, targeting industries like IOT, mobile, and automotive electronics.
By Tech Explore
Hidden PUF using GIDL erasing on Weand Flash memory. (A) PUF Scheme, hiding using V-Nand Flash memory. (b) V-Nand Flash memory circuit diagram. (Image Credit: Nature Communication)


