I. Introduction
Random keys generation is a foundational task in the chain of trust of connected systems, and in security protocols for device authentication, in-transit data confidentiality and integrity assurance, and many others [1]–[6] [see Fig. 1(a)]. Hardware-secure data handling and exchange invariably requires on-chip generation of random keys with dynamic and static entropy enabled by true random number generators (TRNGs) [7]–[15] and physically unclonable functions (PUFs) [16]–[26].
(a) Secure key generation sub-system and (b) in-memory unified entropy source (SRAM with TRNG and PUF) for secure SoCs.