Recognition: no theorem link
Design of Memristive Lightweight Encryption For In-Memory Image Steganography
Pith reviewed 2026-05-13 07:39 UTC · model grok-4.3
The pith
A new data-shifting technique in memristive arrays implements Trivium and Grain-128a ciphers with up to 42 percent fewer steps and 44 percent less energy.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors implement the Trivium and Grain-128a stream ciphers in memristive computation-in-memory arrays using stateful IMPLY logic. They introduce a data-shifting method for the ciphers' shift registers that reduces the number of computational steps and energy consumption by up to 42 percent and 44 percent, respectively, relative to conventional IMPLY-based realizations. These circuits are evaluated within an image steganography application to demonstrate their ability to secure data while limiting movement between memory and processor.
What carries the argument
The proposed efficient data-shifting method applied to the shift registers of Trivium and Grain-128a implemented with stateful IMPLY logic in memristive CIM-A architectures.
If this is right
- Encryption occurs with lower overhead in hardware-constrained devices because data no longer moves repeatedly between memory and processor.
- Security improves for data in transit since all operations remain inside the memory array.
- The same shifting approach can be applied to other register-based lightweight ciphers implemented with IMPLY logic.
- Secure in-memory image processing becomes feasible without exposing plaintext during steganography operations.
Where Pith is reading between the lines
- The shifting optimization could reduce energy in any shift-register cipher mapped to memristive arrays beyond the two examples shown.
- Edge devices that perform secure image handling would see lower total power draw if the in-memory design replaces conventional processor-memory transfers.
- Physical prototypes must be tested to confirm the energy figures hold once memristor variability and wiring parasitics are included.
Load-bearing premise
Stateful IMPLY logic in physical memristive arrays will deliver the modeled step counts and energy savings without extra costs from device variations or interconnect overhead.
What would settle it
Fabricate the proposed memristive circuits for Trivium and Grain-128a, run the ciphers on actual hardware, and measure whether the observed step counts and energy consumption match the simulated reductions of 42 percent and 44 percent.
Figures
read the original abstract
With the expansion of data-intensive applications and increasing data volumes, providing an efficient solution to address growing energy consumption and performance degradation caused by the transfer of large amounts of data between the processor and the main memory has become a severe challenge. The frequent transfer of large amounts of data between internal chip units, memories, and their interconnections exacerbates the vulnerability of the data being accessed. Employing a memristive Computation In-Memory-Array (CIM-A) architecture limits data transfer, thereby addressing both challenges. Furthermore, by integrating lightweight cryptography, developed to secure data in hardware-constrained devices, with CIM-A architectures, the security of data in transit, especially across interconnections, can be ensured. This paper implements two standard lightweight stream ciphers, Trivium and Grain-128a, for CIM using stateful material implication (IMPLY) logic to address these combined security and performance challenges. In addition to redesigning the cryptographic structures, we reduce the hardware complexity of conventional IMPLY-based implementations by proposing an efficient method for shifting data within the shift registers. Applying the proposed data-shifting method to the registers of these ciphers reduces the number of computational steps and decreases energy consumption by up to 42% and 44%, respectively, compared to conventional implementations. Finally, the performance of the proposed circuits is evaluated in a steganography application, demonstrating their practical efficiency.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript describes the design of memristive implementations of the Trivium and Grain-128a lightweight stream ciphers using stateful IMPLY logic within a Computation In-Memory Array (CIM-A) architecture. The authors propose a novel data-shifting method for the shift registers that is claimed to reduce the number of computational steps by up to 42% and energy consumption by up to 44% relative to conventional IMPLY-based designs. These optimized circuits are then evaluated within an image steganography application to illustrate their utility in securing data transfers while mitigating energy and performance bottlenecks in data-intensive systems.
Significance. If substantiated with detailed validation, the work would offer a promising approach to combining lightweight cryptography with in-memory computing to enhance both security and efficiency in hardware-constrained environments. The integration addresses key challenges in data movement between processor and memory, potentially impacting applications in IoT and embedded systems. The specific reductions in steps and energy, if robust, represent a tangible improvement over standard implementations, though their practical impact depends on validation against hardware non-idealities.
major comments (2)
- Abstract: The headline performance claims of up to 42% fewer computational steps and 44% lower energy consumption are presented without any accompanying details on the calculation methodology, the conventional baseline implementations, the memristor device models employed, or the simulation framework used. This lack of supporting information renders the quantitative results impossible to assess or reproduce.
- Evaluation (steganography application): The assessment of the proposed circuits does not include any analysis of the effects of memristor variability (e.g., 10-20% threshold-voltage spreads or resistance drift), interconnect parasitic RC delays, or sneak-path currents. Without Monte-Carlo or corner-case simulations, it is unclear whether the reported efficiency gains would survive in physical hardware.
minor comments (1)
- Abstract: The acronym CIM-A is introduced without expansion; spelling out 'Computation In-Memory Array' on first use would improve readability.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback on our manuscript. We address each major comment point by point below, indicating the revisions we will incorporate in the next version.
read point-by-point responses
-
Referee: Abstract: The headline performance claims of up to 42% fewer computational steps and 44% lower energy consumption are presented without any accompanying details on the calculation methodology, the conventional baseline implementations, the memristor device models employed, or the simulation framework used. This lack of supporting information renders the quantitative results impossible to assess or reproduce.
Authors: We agree that the abstract should provide more context for the headline claims to improve clarity and reproducibility. The detailed calculation methodology (step counting and energy estimation via SPICE), conventional IMPLY-based baseline shift-register designs, VTEAM memristor model parameters, and simulation framework are fully described in Sections III and IV of the manuscript. We will revise the abstract to include a brief summary of these elements, for example by adding a clause such as 'using SPICE simulations with the VTEAM model and conventional IMPLY shift registers as baseline'. revision: yes
-
Referee: Evaluation (steganography application): The assessment of the proposed circuits does not include any analysis of the effects of memristor variability (e.g., 10-20% threshold-voltage spreads or resistance drift), interconnect parasitic RC delays, or sneak-path currents. Without Monte-Carlo or corner-case simulations, it is unclear whether the reported efficiency gains would survive in physical hardware.
Authors: We acknowledge the importance of evaluating robustness under non-ideal conditions. The current results use ideal device models to isolate the benefits of the proposed shift-register method. In the revised manuscript we will add a dedicated subsection discussing the potential impact of variability and include preliminary Monte-Carlo results assuming 10-15% Gaussian variation in threshold voltage and resistance. A full treatment of interconnect RC delays and sneak-path currents would require an extended circuit-level model that goes beyond the scope of the present architectural study; we will note this explicitly as a limitation and direction for future work. revision: partial
Circularity Check
No circularity: step and energy reductions obtained by direct operation counting on proposed shift-register redesign
full rationale
The paper redesigns Trivium and Grain-128a registers for stateful IMPLY logic and introduces a data-shifting method. The headline performance numbers (up to 42% fewer steps, 44% lower energy) are produced by enumerating the IMPLY operations required by the new shifting sequence versus a conventional baseline. No equation is defined in terms of its own output, no parameter is fitted to a subset of results and then re-used as a prediction, and no load-bearing uniqueness theorem or ansatz is imported via self-citation. The derivation therefore remains a straightforward combinatorial count on explicitly stated logic primitives and is self-contained.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption Stateful material implication logic can be reliably implemented with memristive devices for sequential logic operations
- domain assumption Energy consumption scales linearly with the number of IMPLY steps in the shift-register implementation
Reference graph
Works this paper leans on
-
[1]
L. Yang, L. Cheng, Y. Li, H. Li, J. Li, T.-C. Chang, and X. Miao, “Cryptographic key generation and in situ encryption in one-transistor-one-resistor memristors for hardware security,”Advanced Electronic Materials, vol. 7, no. 5, p. 2001182, 2021
work page 2021
-
[2]
Energy-efficient and fast memristor-based serial multipliers applicable in image processing,
S. E. Fatemieh, B. Bagheralmoosavi, and M. R. Reshadinezhad, “Energy-efficient and fast memristor-based serial multipliers applicable in image processing,”Results in Engineering, vol. 25, p. 104013, 2025
work page 2025
-
[3]
J. L. Hennessy and D. A. Patterson,Computer architecture: a quantitative approach. Morgan kaufmann, 2017
work page 2017
-
[4]
S. E. Fatemieh and M. R. Reshadinezhad, “Energy-efficient approximate full adders applying memristive serial imply logic for image processing,”Journal of Electrical and Computer Engineering, vol. 2026, no. 1, p. 7627964, 2026
work page 2026
-
[5]
A high-speed and low-cost approximate full adder in qca technology,
S. E. Fatemieh, N. Mashayekhi, and M. R. Reshadinezhad, “A high-speed and low-cost approximate full adder in qca technology,”The European Physical Journal Plus, vol. 140, no. 8, p. 726, 2025
work page 2025
-
[6]
Power-area efficient serial imply- based 4: 2 compressor applied in data-intensive applications,
B. Bagheralmoosavi, S. E. Fatemieh, M. R. Reshadinezhad, and A. Rubio, “Power-area efficient serial imply- based 4: 2 compressor applied in data-intensive applications,”Cluster Computing, vol. 28, no. 8, p. 512, 2025
work page 2025
-
[7]
S. S. Farahani, M. R. Reshadinezhad, and S. E. Fatemieh, “New design for error-resilient approximate multi- pliers used in image processing in cntfet technology,”The Journal of Supercomputing, vol. 80, no. 3, pp. 3694– 3712, 2024
work page 2024
-
[8]
The gap between processor and memory speeds,
C. Carvalho, “The gap between processor and memory speeds,” inProc. of IEEE International Conference on Control and Automation, pp. 27–34, 2002
work page 2002
-
[9]
N. TaheriNejad, “In-memory computing: Global energy consumption, carbon footprint, technology, and products status quo,” inProc. 24th IEEE Int. Conf. Nanotechnol.(IEEE-NANO), pp. 1–6, 2024
work page 2024
-
[10]
K. Alhaj Ali,New design approaches for flexible architectures and in-memory computing based on memristor technologies. PhD thesis, Ecole nationale superieure Mines-Telecom Atlantique, 2020. Available athttps: //theses.hal.science/tel-03134905/file/2020IMTA0197_AlhajAli-Khaled.pdf
work page 2020
-
[11]
Memristor-based material implication (imply) logic: Design principles and methodologies,
S. Kvatinsky, G. Satat, N. Wald, E. G. Friedman, A. Kolodny, and U. C. Weiser, “Memristor-based material implication (imply) logic: Design principles and methodologies,”IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, no. 10, pp. 2054–2066, 2013
work page 2054
-
[12]
S. Kvatinsky, D. Belousov, S. Liman, G. Satat, N. Wald, E. G. Friedman, A. Kolodny, and U. C. Weiser, “Magic—memristor-aided logic,”IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 61, no. 11, pp. 895–899, 2014
work page 2014
-
[13]
A classification of memory- centric computing,
H. A. D. Nguyen, J. Yu, M. A. Lebdeh, M. Taouil, S. Hamdioui, and F. Catthoor, “A classification of memory- centric computing,”ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 16, no. 2, pp. 1–26, 2020
work page 2020
-
[14]
Memristor-based lightweight encryption,
M. A. Siddiqi, J. A. G. Hern´ andez, A. Gebreziorgis, R. Bishnoi, C. Strydis, S. Hamdioui, and M. Taouil, “Memristor-based lightweight encryption,” in2023 26th Euromicro Conference on Digital System Design (DSD), pp. 634–641, IEEE, 2023
work page 2023
-
[15]
Memristor and trivium-based true random number generator,
T. Kaya, “Memristor and trivium-based true random number generator,”Physica A: Statistical Mechanics and its Applications, vol. 542, p. 124071, 2020
work page 2020
-
[16]
Memristor based random number generator: Architectures and evaluation,
V. K. Rai, S. Tripathy, and J. Mathew, “Memristor based random number generator: Architectures and evaluation,”Procedia Computer Science, vol. 125, pp. 576–583, 2018. 23
work page 2018
-
[17]
Multi-bit true random number generator for iot devices using memris- tor,
V. Rai, S. Tripathy, and J. Mathew, “Multi-bit true random number generator for iot devices using memris- tor,”Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures, p. 35, 2021
work page 2021
-
[18]
Hashpim: High-throughput sha-3 via memristive digital processing-in-memory,
B. Oved, O. Leitersdorf, R. Ronen, and S. Kvatinsky, “Hashpim: High-throughput sha-3 via memristive digital processing-in-memory,” in2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pp. 1–4, IEEE, 2022
work page 2022
-
[19]
N. G. Zinabu, Y. W. Marye, K. K. Tune, and S. A. Demilew, “Comprehensive analysis of lightweight crypto- graphic algorithms for battery-limited internet of things devices,”International Journal of Distributed Sensor Networks, vol. 2025, no. 1, p. 9639728, 2025
work page 2025
-
[20]
A systematic review of ultra-lightweight encryption algorithms,
N. M. Naser and J. R. Naif, “A systematic review of ultra-lightweight encryption algorithms,”International Journal of Nonlinear Analysis and Applications, vol. 13, no. 1, pp. 3825–3851, 2022
work page 2022
-
[21]
A survey of lightweight stream ciphers for embedded systems,
C. Manifavas, G. Hatzivasilis, K. Fysarakis, and Y. Papaefstathiou, “A survey of lightweight stream ciphers for embedded systems,”Security and Communication Networks, vol. 9, no. 10, pp. 1226–1246, 2016
work page 2016
-
[22]
A survey of efficient lightweight cryptography for power-constrained microcontrollers,
J. Soto-Cruz, E. Ruiz-Ibarra, J. V´ azquez-Castillo, A. Espinoza-Ruiz, A. Castillo-Atoche, and J. Mass-Sanchez, “A survey of efficient lightweight cryptography for power-constrained microcontrollers,”Technologies, vol. 13, no. 1, p. 3, 2024
work page 2024
-
[23]
C. Paar, J. Pelzl, and T. G¨ uneysu,Understanding cryptography: From established symmetric and asymmetric ciphers to post-quantum algorithms. Springer Nature, 2024
work page 2024
-
[24]
An aead variant of the grain stream cipher,
M. Hell, T. Johansson, W. Meier, J. S¨ onnerup, and H. Yoshida, “An aead variant of the grain stream cipher,” inInternational Conference on Codes, Cryptology, and Information Security, pp. 55–71, Springer, 2019
work page 2019
-
[25]
Seiler,Heterogeneous Approximate Adders for Memristive Processing in Array
F. Seiler,Heterogeneous Approximate Adders for Memristive Processing in Array. PhD thesis, Technische Universit¨ at Wien, 2025
work page 2025
- [26]
-
[27]
Grain-128a: a new version of grain-128 with optional authentication,
M. ˚Agren, M. Hell, T. Johansson, and W. Meier, “Grain-128a: a new version of grain-128 with optional authentication,”International Journal of Wireless and Mobile Computing, vol. 5, no. 1, pp. 48–59, 2011
work page 2011
-
[28]
P. A. Psomiadis,Security of lightweight cryptographic algorithms. PhD thesis, National And Kapadistrian University of Athens, 2020
work page 2020
-
[29]
Felix: Fast and energy-efficient logic in memory,
S. Gupta, M. Imani, and T. Rosing, “Felix: Fast and energy-efficient logic in memory,” in2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–7, IEEE, 2018
work page 2018
-
[30]
An improved algorithm for imply logic based memristive full-adder,
S. G. Rohani and N. TaheriNejad, “An improved algorithm for imply logic based memristive full-adder,” in 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4, IEEE, 2017
work page 2017
-
[31]
An improved serial imply adder algorithm for efficient neural network appli- cations,
F. Seiler and N. TaheriNejad, “An improved serial imply adder algorithm for efficient neural network appli- cations,” in2025 IEEE 16th Latin America Symposium on Circuits and Systems (LASCAS), vol. 1, pp. 1–5, IEEE, 2025
work page 2025
-
[32]
An efficient robust serial imply-based in-memristor adder,
F. Seiler, N. TaheriNejad,et al., “An efficient robust serial imply-based in-memristor adder,” in2025 Cross- Disciplinary Conference on Memory-Centric Computing (CCMCC), pp. 1–7, IEEE, 2025
work page 2025
-
[33]
Analysis of memristor based ring oscillators for hardware security,
N. A. B. N. Hashim, F. A. B. Hamid, J. Teo, and M. S. A. Hamid, “Analysis of memristor based ring oscillators for hardware security,” in2016 IEEE International Conference on Semiconductor Electronics (ICSE), pp. 181– 184, IEEE, 2016
work page 2016
-
[34]
Memristor-based linear feedback shift register based on material implication logic,
M. Teimoory, A. Amirsoleimani, A. Ahmadi, S. Alirezaee, S. Salimpour, and M. Ahmadi, “Memristor-based linear feedback shift register based on material implication logic,” in2015 European Conference on Circuit Theory and Design (ECCTD), pp. 1–4, IEEE, 2015. 24
work page 2015
-
[35]
Fast and compact serial imply-based approximate full adders applied in image processing,
S. E. Fatemieh, M. R. Reshadinezhad, and N. TaheriNejad, “Fast and compact serial imply-based approximate full adders applied in image processing,”IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 13, no. 1, pp. 175–188, 2023
work page 2023
-
[36]
S. Asgari, M. R. Reshadinezhad, and S. E. Fatemieh, “Energy-efficient and fast imply-based approximate full adder applying nand gates for image processing,”Computers and Electrical Engineering, vol. 113, p. 109053, 2024
work page 2024
-
[37]
S. Asgari, M. R. Reshadinezhad, and S. E. Fatemieh, “Energy-efficient and fast imply-based approximate 4: 2 compressor applying nand gates for image processing,”Available at SSRN 5375944, 2025
work page 2025
-
[38]
Fast and low energy approximate full adder based on felix logic,
S. E. Fatemieh, S. Asgari, and M. R. Reshadinezhad, “Fast and low energy approximate full adder based on felix logic,”arXiv preprint arXiv:2505.06888, 2025
-
[39]
B. Debnath, J. C. Das, and D. De, “Design of image steganographic architecture using quantum-dot cellular automata for secure nanocommunication networks,”Nano communication networks, vol. 15, pp. 41–58, 2018
work page 2018
-
[40]
A survey of techniques for approximate computing,
S. Mittal, “A survey of techniques for approximate computing,”ACM Computing Surveys (CSUR), vol. 48, no. 4, pp. 1–33, 2016. 25
work page 2016
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.