Asymmetric cryptography enabled by TaOx-based complementary memristors with tunable pulse dynamics

Abstract

As the demand for secure communication grows in open and resource-constrained environments, traditional encryption schemes encounter significant challenges, particularly in key management and energy efficiency. To address these limitations, this study introduces a hardware-based asymmetric encryption framework utilizing TaOx-based complementary memristors. The framework leverages tunable conductance modulation in complementary resistive switching (CRS) devices to optimize the voltage pulse amplitude and interval. This approach facilitates the realization of long-term potentiation (LTP) and long-term depression (LTD) using pulses of the same polarity, thereby enabling the generation of public and private keys. Binary-encoded ASCII data are converted into quantized conductance states using a 2 × 4 CRS crossbar array, ensuring reliable and reversible encryption and decryption directly within memory. Additionally, an SHA-256-based hash algorithm is integrated for identity-based authentication using public keys, eliminating the need for secure channels during the verification process. Our results demonstrate high encryption fidelity, distinct key separation, and strong resistance to unauthorized access, highlighting the potential of TaOx-based complementary memristors for secure cryptographic applications in next-generation IoT and embedded systems.

Graphical abstract: Asymmetric cryptography enabled by TaOx-based complementary memristors with tunable pulse dynamics

Supplementary files

Article information

Article type
Paper
Submitted
04 Oct 2025
Accepted
21 Jan 2026
First published
22 Jan 2026

Nanoscale, 2026, Advance Article

Asymmetric cryptography enabled by TaOx-based complementary memristors with tunable pulse dynamics

Y. Zhu, X. Wu, J. Zhang, H. Chen, S. Rao, J. Yan, X. Sun, Y. Zhao, Y. Zhu, L. Yao, Z. Xu, Z. Wu and Y. Dai, Nanoscale, 2026, Advance Article , DOI: 10.1039/D5NR04210K

To request permission to reproduce material from this article, please go to the Copyright Clearance Center request page.

If you are an author contributing to an RSC publication, you do not need to request permission provided correct acknowledgement is given.

If you are the author of this article, you do not need to request permission to reproduce figures and diagrams provided correct acknowledgement is given. If you want to reproduce the whole article in a third-party publication (excluding your thesis/dissertation for which permission is not required) please go to the Copyright Clearance Center request page.

Read more about how to correctly acknowledge RSC content.

Social activity

Spotlight

Advertisements