Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Quantum-activated neural reservoirs on-chip open up large hardware security models for resilient authentication (2403.14188v1)

Published 21 Mar 2024 in cond-mat.dis-nn, cs.AI, and cs.CR

Abstract: Quantum artificial intelligence is a frontier of artificial intelligence research, pioneering quantum AI-powered circuits to address problems beyond the reach of deep learning with classical architectures. This work implements a large-scale quantum-activated recurrent neural network possessing more than 3 trillion hardware nodes/cm$2$, originating from repeatable atomic-scale nucleation dynamics in an amorphous material integrated on-chip, controlled with 0.07 nW electric power per readout channel. Compared to the best-performing reservoirs currently reported, this implementation increases the scale of the network by two orders of magnitude and reduces the power consumption by six, reaching power efficiencies in the range of the human brain, dissipating 0.2 nW/neuron. When interrogated by a classical input, the chip implements a large-scale hardware security model, enabling dictionary-free authentication secure against statistical inference attacks, including AI's present and future development, even for an adversary with a copy of all the classical components available. Experimental tests report 99.6% reliability, 100% user authentication accuracy, and an ideal 50% key uniqueness. Due to its quantum nature, the chip supports a bit density per feature size area three times higher than the best technology available, with the capacity to store more than $2{1104}$ keys in a footprint of 1 cm$2$. Such a quantum-powered platform could help counteract the emerging form of warfare led by the cybercrime industry in breaching authentication to target small to large-scale facilities, from private users to intelligent energy grids.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (58)
  1. Hands-on reservoir computing: a tutorial for practical implementation. Neuromorphic Computing and Engineering 2, 032002 (2022).
  2. Dynamic machine vision with retinomorphic photomemristor-reservoir computing. Nature Communications 14, 2169 (2023).
  3. Moon, J. et al. Temporal data classification and forecasting using a memristor-based reservoir computing system. Nature Electronics 2, 480–487 (2019).
  4. Abreu Araujo, F. et al. Role of non-linear data processing on speech recognition task in the framework of reservoir computing. Scientific Reports 10, 328 (2020).
  5. Körber, L. et al. Pattern recognition in reciprocal space with a magnon-scattering reservoir. Nature Communications 14, 3954 (2023).
  6. Liu, B. et al. Forecasting stock market with nanophotonic reservoir computing system based on silicon optomechanical oscillators. Optics Express 30, 23359–23381 (2022).
  7. Large-scale photonic natural language processing. Photonics Research 10, 2846–2853 (2022).
  8. Bommasani, R. et al. On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258 (2021).
  9. Cai, H. et al. Brain organoid reservoir computing for artificial intelligence. Nature Electronics 1–8 (2023).
  10. Realising and compressing quantum circuits with quantum reservoir computing. Communications Physics 4, 105 (2021).
  11. Naeem, M. et al. Trends and future perspective challenges in big data. In Advances in intelligent data analysis and applications, 309–325 (Springer, 2022).
  12. Adam, D. Cryptography on the front line. Nature 413, 766–768 (2001).
  13. Li, X. et al. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet of Things Journal 5, 1606–1615 (2017).
  14. Joshi, S. K. et al. A trusted node–free eight-user metropolitan quantum communication network. Science advances 6, eaba0959 (2020).
  15. Once more unto the breach: What the equifax and uber data breaches reveal about the intersection of information security and the enforcement of securities laws. Crim. Just. 33, 4 (2018).
  16. Misra, P. Lesson from aadhaar: Analog aspects of digital governance shouldn’t be overlooked. Pathways for Prosperity Commission Background Paper Series 34 (2019).
  17. Developing a global data breach database and the challenges encountered. Journal of Data and Information Quality (JDIQ) 13, 1–33 (2021).
  18. Zhong, D. et al. Twin physically unclonable functions based on aligned carbon nanotube arrays. Nature Electronics 5, 424–432 (2022).
  19. Wali, A. et al. Biological physically unclonable function. Communications Physics 2, 39 (2019).
  20. Moglianetti, M. et al. Nanocatalyst-enabled physically unclonable functions as smart anticounterfeiting tags with ai-aided smartphone authentication. ACS Applied Materials & Interfaces 14, 25898–25906 (2022).
  21. Hu, Z. et al. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes. Nature Nanotechnology 11, 559–565 (2016).
  22. Dodda, A. et al. Graphene-based physically unclonable functions that are reconfigurable and resilient to machine learning attacks. Nature Electronics 4, 364–374 (2021).
  23. John, R. A. et al. Halide perovskite memristors as flexible and reconfigurable physical unclonable functions. Nature Communications 12, 3681 (2021).
  24. Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips. Nature Communications 10, 5827 (2019).
  25. Nist-certified secure key generation via deep learning of physical unclonable functions in silica aerogels. Nanophotonics 10, 457–464 (2021).
  26. Liu, Y. et al. Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication. Nature Communications 10, 2409 (2019).
  27. Using gate tunnelling in bulk cmos to create a puf. IEEE Internet of Things Journal (2023).
  28. Roberts, J. et al. Using quantum confinement to uniquely identify devices. Scientific reports 5, 16456 (2015).
  29. Fukuoka, T. et al. Physically unclonable functions taggant for universal steganographic prints. Scientific Reports 12, 985 (2022).
  30. Authentication of integrated circuits (2010). US Patent 7,840,803.
  31. Cloning physically unclonable functions. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 1–6 (IEEE, 2013).
  32. On the effectiveness of the remanence decay side-channel to clone memory-based \cePUFs. In International Conference on Cryptographic Hardware and Embedded Systems, 107–125 (Springer, 2013).
  33. Memory-based \cePUFs are vulnerable as well: A non-invasive attack against \ceSRAM \cePUFs. IEEE Transactions on Information Forensics and Security 16, 4035–4049 (2021).
  34. Rührmair, U. et al. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM conference on Computer and communications security, 237–249 (2010).
  35. Model building attacks on physically unclonable functions using genetic programming. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 41–44 (IEEE, 2013).
  36. Low-overhead \ceXOR \ceMulti-PUF against machine learning attacks. Microelectronics Journal 105964 (2023).
  37. Dc-\cePUF: Machine learning-resistant \cePUF-based authentication protocol using dependency chain for resource-constraint \ceIoT devices. Journal of Network and Computer Applications 217, 103693 (2023).
  38. Lattice \cePUF: A strong physical unclonable function provably secure against machine learning attacks. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 273–283 (IEEE, 2020).
  39. \ceMXPUF: Secure \cePUF design against state-of-the-art modeling attacks. Cryptology ePrint Archive (2017).
  40. Loke, D. et al. Breaking the speed limits of phase-change memory. Science 336, 1566–1569 (2012).
  41. Gholipour, B. The promise of phase-change materials. Science 366, 186–187 (2019).
  42. An optoelectronic framework enabled by low-dimensional phase-change films. Nature 511, 206–211 (2014).
  43. Nevzorov, A. et al. Two-stage conductivity switching of gst thin films induced by femtosecond laser radiation. Optics & Laser Technology 157, 108773 (2023).
  44. Capacitance–voltage measurements of ge–sb–te thin films. Physica Scripta 77, 015701 (2007).
  45. Multilayer feedforward networks are universal approximators. Neural Networks 2, 359–366 (1989).
  46. Elements of Information Theory (Wiley-Interscience, 2006).
  47. Physical Unclonable Functions in Theory and Practice (Springer Publishing Company, Incorporated, 2012).
  48. Wu, C. et al. Programmable phase-change metasurfaces on waveguides for multimode photonic convolutional neural network. Nature communications 12, 96 (2021).
  49. Application of resistive random access memory in hardware security: A review. Advanced Electronic Materials 7, 2100536 (2021).
  50. Yang, J. et al. A machine-learning-resistant 3d puf with 8-layer stacking vertical rram and 0.014% bit error rate using in-cell stabilization scheme for iot security applications. In 2020 IEEE International Electron Devices Meeting (IEDM), 28–6 (IEEE, 2020).
  51. Establishment of highly dense wire bonding with insulated au wire. In 2022 IEEE 24th Electronics Packaging Technology Conference (EPTC), 352–356 (IEEE, 2022).
  52. Design and evaluation of xor arbiter physical unclonable function and its implementation on fpga in hardware security applications. Journal of Electronic Testing 38, 653–666 (2022).
  53. Ott, E. Chaos in Dynamical Systems (Cambridge University Press, 2002), 2 edn.
  54. Commercial national security algorithm suite 2.0” (cnsa 2.0) cybersecurity advisory (csa). NSA Releases Future Quantum-Resistant (QR) Algorithm Requirements for National Security Systems (2022).
  55. Petitcolas, F. A. Kerckhoffs’ principle. In Encyclopedia of Cryptography, Security and Privacy, 1–2 (Springer, 2023).
  56. A single quantum cannot be cloned. Nature 299, 802–803 (1982).
  57. Lightweight integrated design of puf and trng security primitives based on eflash memory in 55-nm cmos. IEEE Transactions on Electron Devices 67, 1586–1592 (2020).
  58. An overview of power dissipation and control techniques in cmos technology. J. Eng. Sci. Technol 10, 364–382 (2015).

Summary

We haven't generated a summary for this paper yet.