Fingerprint makes chips counterfeit-proof

Feb 08, 2011
Digital fingerprint makes chips conterfeit-proof. Credit: Fraunhofer SIT

Product counterfeiters are increasingly targeting chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component‘s individual material properties to generate a digital key. This provides components with an identity – since their unique structure cannot be copied. Fraunhofer researchers will be presenting a prototype at the embedded world Exhibition & Conference in Nuremberg from March 1 to 3.

Product piracy long ago ceased to be limited exclusively to the consumer goods sector. Industry, too, is increasingly having to combat this problem. Cheap fakes cost business dear: The German mechanical and plant engineering sector alone lost 6.4 billion euros of revenue in 2010, according to a survey by the German Engineering Federation (VDMA). Sales losses aside, low-quality counterfeits can also damage a company‘s brand image. Worse, they can even put people‘s lives at risk if they are used in areas where safety is paramount, such as automobile or aircraft manufacture. Patent rights or organizational provisions such as confidentiality agreements are no longer sufficient to prevent product piracy. Today’s commercially available anti-piracy technology provides a degree of protection, but it no longer constitutes an insurmountable obstacle for the product counterfeiters: Criminals are using scanning electron microscopes, focused ion beams or laser bolts to intercept security keys – and adopting increasingly sophisticated methods.

No two chips are the same

At embedded world, researchers from the Fraunhofer Institute for Secure Information Technology SIT will be demonstrating how or chips can be made counterfeit-proof using physical unclonable functions (PUFs). ”Every component has a kind of individual fingerprint since small differences inevitably arise between components during production”, explains Dominik Merli, a scientist at Fraunhofer SIT in Garching near Munich. Printed circuits, for instance, end up with minimal variations in thickness or length during the manufacturing process. While these variations do not affect functionality, they can be used to generate a unique code.

Invasive attacks destroy the structure

A PUF module is integrated directly into a chip – a setup that is feasible not only in a large number of programmable semiconductors known as FPGAs (field programmable gate arrays) but equally in hardware components such as microchips and smartcards. “At its heart is a measuring circuit, for instance a ring oscillator. This oscillator generates a characteristic clock signal which allows the chip‘s precise material properties to be determined. Special electronic circuits then read these measurement data and generate the component-specific key from the data”, explains Merli. Unlike conventional cryptographic processes, the secret key is not stored on the hardware but is regenerated as and when required. Since the code relates directly to the system properties at any given point in time, it is virtually impossible to extract and clone it. Invasive attacks on the would alter physical parameters, thus distorting or destroying the unique structure.

The Garching-based researchers have already developed two prototypes: A butterfly PUF and a ring oscillator PUF. At present, these modules are being optimized for practical applications. The experts will be at embedded world in Nuremberg (hall 11, stand 203) from March 1-3 to showcase FPGA boards that can generate an individual cryptographic key using a ring oscillator PUF. These allow attack-resistant security solutions to be rolled out in embedded systems.

Explore further: A smart prosthetic knee with in-vivo diagnoses

add to favorites email to friend print save as pdf

Related Stories

Secure radio signal for central locking

Feb 01, 2010

(PhysOrg.com) -- Remote central locking is among the most convenient aspects of modern motoring. Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption ...

Cycling More Intelligently

Apr 11, 2008

Modern bicycles leave nothing to be desired. 21, 24, 27 gears! For many amateur cyclists, such luxury is too much of a good thing. They change gear too infrequently and too late, get out of breath and don’t ...

Lightweight true random number generators a step closer

Sep 20, 2010

The widespread use of true random number generators (TRNGs) has taken a step closer following the creation of the most lightweight designs to date by researchers at Queen's University Belfast's Institute of Electronics, Communications ...

Brilliant counterfeit protection

Jun 02, 2010

(PhysOrg.com) -- Counterfeit products create losses in the billions each year. Beside the economic damages, all too often additional risks arise from the poor materials and shoddy workmanship of "knock-off ...

Intelligence inside metal components

Nov 24, 2009

Up to now, extreme production temperatures made it impossible to equip metallic components with RFID chips during the operating process. At Euromold in Frankfurt (Dec. 2-5), Germany, Fraunhofer researchers ...

Sony Develops Wireless Chip Connections

Apr 06, 2010

(PhysOrg.com) -- Sony has recently developed a wireless chip alternative to today’s chips that use conventional pin connections. This sets new limits on how small an electronic device can be.

Recommended for you

A smart prosthetic knee with in-vivo diagnoses

23 hours ago

The task was to develop intelligent prosthetic joints that, via sensors, are capable of detecting early failure long before a patient suffers. EPFL researchers have taken up the challenge.

Old tires become material for new and improved roads

Apr 22, 2014

(Phys.org) —Americans generate nearly 300 million scrap tires every year, according to the Environmental Protection Agency (EPA). Historically, these worn tires often end up in landfills or, when illegally ...

Students take clot-buster for a spin

Apr 21, 2014

(Phys.org) —In the hands of some Rice University senior engineering students, a fishing rod is more than what it seems. For them, it's a way to help destroy blood clots that threaten lives.

User comments : 0

More news stories

Robot scouts rooms people can't enter

(Phys.org) —Firefighters, police officers and military personnel are often required to enter rooms with little information about what dangers might lie behind the door. A group of engineering students at ...

Finalists named in Bloomberg European city contest

Amsterdam wants to create an online game to get unemployed young people engaged in finding jobs across Europe. Schaerbeek, Belgium, envisions using geothermal mapping to give households personalized rundowns of steps to save ...

Internet TV case: US justices skeptical, concerned

Grappling with fast-changing technology, U.S. Supreme Court justices debated Tuesday whether they can protect the copyrights of TV broadcasters to the shows they send out without strangling innovations in ...

Brazil passes trailblazing Internet privacy law

Brazil's Congress on Tuesday passed comprehensive legislation on Internet privacy in what some have likened to a web-user's bill of rights, after stunning revelations its own president was targeted by US ...

In the 'slime jungle' height matters

(Phys.org) —In communities of microbes, akin to 'slime jungles', cells evolve not just to grow faster than their rivals but also to push themselves to the surface of colonies where they gain the best access ...