Featured Research

from universities, journals, and other organizations

Fingerprint makes computer chips counterfeit-proof

Date:
February 8, 2011
Source:
Fraunhofer-Gesellschaft
Summary:
Product counterfeiters are increasingly targeting computer chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component's individual material properties to generate a digital key. This provides components with an identity -- since their unique structure cannot be copied.

Digital fingerprint makes chips conterfeit-proof.
Credit: Fraunhofer SIT

Product counterfeiters are increasingly targeting chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component's individual material properties to generate a digital key. This provides components with an identity -- since their unique structure cannot be copied.

Fraunhofer researchers will be presenting a prototype at the embedded world Exhibition & Conference in Nuremberg from March 1 to 3.

Product piracy long ago ceased to be limited exclusively to the consumer goods sector. Industry, too, is increasingly having to combat this problem. Cheap fakes cost business dear: The German mechanical and plant engineering sector alone lost 6.4 billion euros of revenue in 2010, according to a survey by the German Engineering Federation (VDMA). Sales losses aside, low-quality counterfeits can also damage a company's brand image. Worse, they can even put people's lives at risk if they are used in areas where safety is paramount, such as automobile or aircraft manufacture. Patent rights or organizational provisions such as confidentiality agreements are no longer sufficient to prevent product piracy. Today's commercially available anti-piracy technology provides a degree of protection, but it no longer constitutes an insurmountable obstacle for the product counterfeiters: Criminals are using scanning electron microscopes, focused ion beams or laser bolts to intercept security keys -- and adopting increasingly sophisticated methods.

No two chips are the same

At embedded world, researchers from the Fraunhofer Institute for Secure Information Technology SIT will be demonstrating how electronic components or chips can be made counterfeit-proof using physical unclonable functions (PUFs). "Every component has a kind of individual fingerprint since small differences inevitably arise between components during production," explains Dominik Merli, a scientist at Fraunhofer SIT in Garching near Munich. Printed circuits, for instance, end up with minimal variations in thickness or length during the manufacturing process. While these variations do not affect functionality, they can be used to generate a unique code.

Invasive attacks destroy the structure

A PUF module is integrated directly into a chip -- a setup that is feasible not only in a large number of programmable semiconductors known as FPGAs (field programmable gate arrays) but equally in hardware components such as microchips and smartcards. "At its heart is a measuring circuit, for instance a ring oscillator. This oscillator generates a characteristic clock signal which allows the chip's precise material properties to be determined. Special electronic circuits then read these measurement data and generate the component-specific key from the data," explains Merli. Unlike conventional cryptographic processes, the secret key is not stored on the hardware but is regenerated as and when required. Since the code relates directly to the system properties at any given point in time, it is virtually impossible to extract and clone it. Invasive attacks on the chip would alter physical parameters, thus distorting or destroying the unique structure.

The Garching-based researchers have already developed two prototypes: A butterfly PUF and a ring oscillator PUF. At present, these modules are being optimized for practical applications. The experts will be at embedded world in Nuremberg (hall 11, stand 203) from March 1-3 to showcase FPGA boards that can generate an individual cryptographic key using a ring oscillator PUF. These allow attack-resistant security solutions to be rolled out in embedded systems.


Story Source:

The above story is based on materials provided by Fraunhofer-Gesellschaft. Note: Materials may be edited for content and length.


Cite This Page:

Fraunhofer-Gesellschaft. "Fingerprint makes computer chips counterfeit-proof." ScienceDaily. ScienceDaily, 8 February 2011. <www.sciencedaily.com/releases/2011/02/110208091719.htm>.
Fraunhofer-Gesellschaft. (2011, February 8). Fingerprint makes computer chips counterfeit-proof. ScienceDaily. Retrieved August 2, 2014 from www.sciencedaily.com/releases/2011/02/110208091719.htm
Fraunhofer-Gesellschaft. "Fingerprint makes computer chips counterfeit-proof." ScienceDaily. www.sciencedaily.com/releases/2011/02/110208091719.htm (accessed August 2, 2014).

Share This




More Matter & Energy News

Saturday, August 2, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Tesla, Panasonic Ink Deal To Make Huge Battery 'Gigafactory'

Tesla, Panasonic Ink Deal To Make Huge Battery 'Gigafactory'

Newsy (July 31, 2014) The deal will help build a massive battery factory that Tesla says will produce 500,000 lithium batteries by 2020. Video provided by Newsy
Powered by NewsLook.com
Britain Testing Driverless Cars on Roadways

Britain Testing Driverless Cars on Roadways

AP (July 30, 2014) British officials said on Wednesday that driverless cars will be tested on roads in as many as three cities in a trial program set to begin in January. Officials said the tests will last up to three years. (July 30) Video provided by AP
Powered by NewsLook.com
7 Ways to Use Toothpaste: Howdini Hacks

7 Ways to Use Toothpaste: Howdini Hacks

Howdini (July 30, 2014) Fresh breath and clean teeth are great, but have you ever thought, "my toothpaste could be doing more". Well, it can! Lots of things! Howdini has 7 new uses for this household staple. Video provided by Howdini
Powered by NewsLook.com
Smoked: 2015 Ducati Diavel Vs 2014 Chevy Corvette Stingray Drag Race

Smoked: 2015 Ducati Diavel Vs 2014 Chevy Corvette Stingray Drag Race

Cycle World (July 30, 2014) The Bonnier Motorcycle Group presents Smoked; a three part video series. In this episode the 2015 Ducati Diavel takes on the 2014 Chevy Corvette Stingray Video provided by Cycle World
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins