Research
Electrical Testing of Passive Components
Electrochemical Methods to Measure Corrosion Potential of Flux Residue
Engineered Flux for Low Temperature Solders
Advanced Printing for Microelectronic Packaging
Assembly Reliability of TSOP/DFN PoP Stack Package
Solder Joint Embrittlement Mechanisms, Solutions and Standards
Through-Hole Rework for Challenging Components
Advances in Power Electronics
MORE RESEARCH
Latest Industry News
Hon Hai Unveils Three Electric Vehicle Models
Get Ready For The Next Generation Of Wearable Tech
Wistron to spend NT$10bn on facilities in Kaohsiung
Ghost Robotics CEO on Armed Robots for the U.S. Military
3 Ways to Get Comfortable With Changing Times
The prospect of Processing In Memory (PIM) in memory systems for AI applications
Biggest Tech Companies Now Building the Biggest Data Pipes
The Versatile Preform
MORE INDUSTRY NEWS

Hacker-Proof Digital Fingerprints



Hacker-Proof Digital Fingerprints
Researchers have found a way to use chaos to create digital fingerprints for electronic devices that may be unique enough to foil sophisticated hackers.
Technology Briefing

Transcript


Researchers at Ohio State University have found a way to use chaos to create digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. Just how unique are these fingerprints? The researchers believe it would take longer than the lifetime of the universe to test for every possible combination available. The study, recently published online in the journal IEEE Access, involves an emerging technology called physically unclonable functions, or PUFs, that are built into computer chips.

These new PUFs could potentially be used to create secure ID cards, to track goods in supply chains and as part of authentication applications, where it is vital to know that you’re not communicating with an impostor. The SolarWinds hack that targeted the U.S. government really got people thinking about how we’re going to be doing authentication and cryptography. And this could be part of the answer. The new solution makes use of PUFs, which take advantage of tiny manufacturing variations found in each computer chip — variations so small that they aren’t noticeable to the end user.

There’s a wealth of information in even the smallest differences found on computers chips that we can exploit to create PUFs. These slight variations — sometimes seen only at the atomic level — are used to create unique sequences of 0s and 1s that researchers in the field call, appropriately enough, “secrets.” Other groups have developed what they thought were strong PUFs, but research showed that hackers could successfully attack them. The problem is that current PUFs contain only a limited number of secrets. If you have a PUF where this number is 1,000 or 10,000 or even a million, a hacker with the right technology and enough time can learn all the secrets on the chip.” The Ohio State team found a way to produce an uncountably large number of secrets to use that will make it next to impossible for hackers to figure them out, even if they had direct access to the computer chip. The key to creating the improved PUF is chaos.

The researchers created a complex network in their PUFs using a web of randomly interconnected logic gates. Logic gates take two electric signals and use them to create a new signal. They used the gates in a non-standard way that creates unreliable behavior. But that’s what we want. We are exploiting that unreliable behavior to create a type of deterministic chaos. The chaos amplifies the small manufacturing variations found on the chip. Even the smallest differences, when amplified by chaos, can change the entire class of possible outcomes, in this case, the secrets that are being produced. Chaos really expands the number of secrets that are available on a chip. This will likely confuse any attempts at predicting the secrets.

One key to the process is letting the chaos run just long enough on the chip. If you let it run too long, it becomes too chaotic. The process runs long enough to create patterns that are too complex for hackers to attack and guess. But the pattern must be reproducible so we can use it for authentication tasks.” The researchers calculated that their PUF could create 1077 secrets. How big is that number? Imagine if a hacker could guess one secret every microsecond: that is 1 million secrets per second. It would take the hacker longer than the life of the universe, about 20 billion years, to guess every secret available in that microchip.

As part of the study, the researchers attacked their PUF to see if it could be successfully hacked. They attempted machine learning attacks, including deep learning-based methods and model-based attacks — all of which failed. They are now offering their data to other research groups to see if they can find a way to hack it. The hope is that PUFs like this could help beef up security against even state-sponsored hacker attacks, which are generally very sophisticated and backed up with a lot of computer resources. For example, Russia is suspected of backing the SolarWinds hack that was uncovered in December. That hack reportedly gained access to email accounts of officials in the Department of Homeland Security and the department’s cybersecurity staff.

It is a constant battle to come up with technology that can stay ahead of hackers. We are trying to come up with technology that no hacker — no matter your resources, no matter what supercomputer you use — will be able to crack. The researchers have applied for an international patent for their PUF device. The goal of the team is to commercialize the technology. The researchers recently founded a company called Verilock, with the goal of bringing a product to market within a year. This technology could be a real game-changer in cybersecurity.

Comments

No comments have been submitted to date.

Submit A Comment


Comments are reviewed prior to posting. You must include your full name to have your comments posted. We will not post your email address.

Your Name


Your Company
Your E-mail


Your Country
Your Comments



Board Talk
Can Tape Residue Contaminate a Clean Tank?
Suggested Stencil Wipe Frequency?
Reflow Oven Zone Separation Challenges
When To Use Adhesive To Bond SMT Components
How To Clean a Vintage Circuit Board Assembly?
PCBA Inspection Concerns
When is it Time to Switch from Manual Assembly to Automation?
Keys for Moisture Sensitive Device Control
MORE BOARD TALK
Ask the Experts
Solder Paste Life on the Stencil
ESD and Humidification
Water Wash vs. No-clean
Dam & Fill vs. Conformal Coating
Solder Joint Blow Holes
Conformal Coating Bubbles
What Causes Component Rotation During Reflow?
Mixed Process Solder Joint Appearance, Smooth or Grainy?
MORE ASK THE EXPERTS