Fingerprint makes chips counterfeit-proof

Feb 08, 2011
Digital fingerprint makes chips conterfeit-proof. Credit: Fraunhofer SIT

Product counterfeiters are increasingly targeting chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component‘s individual material properties to generate a digital key. This provides components with an identity – since their unique structure cannot be copied. Fraunhofer researchers will be presenting a prototype at the embedded world Exhibition & Conference in Nuremberg from March 1 to 3.

Product piracy long ago ceased to be limited exclusively to the consumer goods sector. Industry, too, is increasingly having to combat this problem. Cheap fakes cost business dear: The German mechanical and plant engineering sector alone lost 6.4 billion euros of revenue in 2010, according to a survey by the German Engineering Federation (VDMA). Sales losses aside, low-quality counterfeits can also damage a company‘s brand image. Worse, they can even put people‘s lives at risk if they are used in areas where safety is paramount, such as automobile or aircraft manufacture. Patent rights or organizational provisions such as confidentiality agreements are no longer sufficient to prevent product piracy. Today’s commercially available anti-piracy technology provides a degree of protection, but it no longer constitutes an insurmountable obstacle for the product counterfeiters: Criminals are using scanning electron microscopes, focused ion beams or laser bolts to intercept security keys – and adopting increasingly sophisticated methods.

No two chips are the same

At embedded world, researchers from the Fraunhofer Institute for Secure Information Technology SIT will be demonstrating how or chips can be made counterfeit-proof using physical unclonable functions (PUFs). ”Every component has a kind of individual fingerprint since small differences inevitably arise between components during production”, explains Dominik Merli, a scientist at Fraunhofer SIT in Garching near Munich. Printed circuits, for instance, end up with minimal variations in thickness or length during the manufacturing process. While these variations do not affect functionality, they can be used to generate a unique code.

Invasive attacks destroy the structure

A PUF module is integrated directly into a chip – a setup that is feasible not only in a large number of programmable semiconductors known as FPGAs (field programmable gate arrays) but equally in hardware components such as microchips and smartcards. “At its heart is a measuring circuit, for instance a ring oscillator. This oscillator generates a characteristic clock signal which allows the chip‘s precise material properties to be determined. Special electronic circuits then read these measurement data and generate the component-specific key from the data”, explains Merli. Unlike conventional cryptographic processes, the secret key is not stored on the hardware but is regenerated as and when required. Since the code relates directly to the system properties at any given point in time, it is virtually impossible to extract and clone it. Invasive attacks on the would alter physical parameters, thus distorting or destroying the unique structure.

The Garching-based researchers have already developed two prototypes: A butterfly PUF and a ring oscillator PUF. At present, these modules are being optimized for practical applications. The experts will be at embedded world in Nuremberg (hall 11, stand 203) from March 1-3 to showcase FPGA boards that can generate an individual cryptographic key using a ring oscillator PUF. These allow attack-resistant security solutions to be rolled out in embedded systems.

Explore further: Researchers find security flaws in backscatter X-ray scanners

add to favorites email to friend print save as pdf

Related Stories

Secure radio signal for central locking

Feb 01, 2010

(PhysOrg.com) -- Remote central locking is among the most convenient aspects of modern motoring. Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption ...

Cycling More Intelligently

Apr 11, 2008

Modern bicycles leave nothing to be desired. 21, 24, 27 gears! For many amateur cyclists, such luxury is too much of a good thing. They change gear too infrequently and too late, get out of breath and don’t ...

Lightweight true random number generators a step closer

Sep 20, 2010

The widespread use of true random number generators (TRNGs) has taken a step closer following the creation of the most lightweight designs to date by researchers at Queen's University Belfast's Institute of Electronics, Communications ...

Brilliant counterfeit protection

Jun 02, 2010

(PhysOrg.com) -- Counterfeit products create losses in the billions each year. Beside the economic damages, all too often additional risks arise from the poor materials and shoddy workmanship of "knock-off ...

Intelligence inside metal components

Nov 24, 2009

Up to now, extreme production temperatures made it impossible to equip metallic components with RFID chips during the operating process. At Euromold in Frankfurt (Dec. 2-5), Germany, Fraunhofer researchers ...

Sony Develops Wireless Chip Connections

Apr 06, 2010

(PhysOrg.com) -- Sony has recently developed a wireless chip alternative to today’s chips that use conventional pin connections. This sets new limits on how small an electronic device can be.

Recommended for you

Virtual reality guides those whose memory is failing

4 hours ago

Experts agree that the ability to navigate a neighborhood or built space is one of the first faculties to suffer at the onset of cognitive decline. They also agree that early intervention is crucial for stemming ...

User comments : 0