I. Introduction
Random number generator (RNG) is an essential building block for secure data handling systems, stochastic computation, brain-inspired computing, and Monte Carlo simulations. True RNGs (TRNGs) exploit the inherent nondeterministic or chaotic physical phenomena of circuits and devices to generate random bits, making them extremely hard to predict and thus important for cyber-security applications [1], [2]. Several proposals in the literature on TRNG have been demonstrated over the last few years that rely on exploiting different physical processes of nanoelectronic devices/circuits, harnessing inherent physical properties, such as switching behavior, random telegraphic noise (RTN), variability, and stochasticity [3]–[5]. Recently, the generation of random numbers based on semiconductor memory (volatile and non-volatile) has also been explored. TRNG based on static random access memory (SRAM) [6], dynamic random access memory (DRAM) [7], [8], charge-based flash memory [9], and even emerging non-volatile memory (NVM), such as resistive random access memory (RRAM) [10], [11], STT/MRAM [12], and FRAM [13], has been proposed. The memory-based RNGs proposed in the literature exploit multiple phenomena, such as remanence effect of a memory cell [14], memory startup values [15], program disturb [16], RTN and thermal noise [17], switching-time variability, access-time variability [18], and partial programming of memory cells [19]. However, most NVM-TRNG results in the literature are based either on simulations or implemented on a few standalone devices or small arrays [18], [20]. Moreover, most of these NVM hardware TRNGs require analog sensing and additional complex interfacing circuits apart from the NVM arrays [21]. Limited work exists on TRNGs that can be extracted from off-the-shelf commercial NVM chips [9], [19], [22]. The advantages of using off-the-shelf NVM chips for TRNG applications are: 1) ease of implementation, 2) low cost, and 3) reduction of additional complex circuitry. Moreover, the use of off-the-shelf NVM chip for security application expands the utility of the technology from data storage to data security simultaneously. In this article, we present the extraction of true random numbers (TRNs) from two different types of commercially available off-the-shelf NVM chips: 1) emerging resistive NVM [23] and 2) conventional charge-based NOR flash [24]. We primarily exploit the variability in page-write, page-erase, or sector-erase latency. The latency variability is coupled with a post-processing technique that significantly enhances the quality of randomness of the obtained bit streams. Key contributions of this article are as follows:
a generalized methodology for TRNG from NVM chips based on a different underlying working principle without modifying existing memory chip macro;
experimental demonstration of high-quality NVM TRNG over a wide range of operational temperatures.