Emerging Technologies

Can computer chip ‘fingerprints’ help fight counterfeiting?

Rob Matheson
Contributing Writer, MIT Technology Review

It’s often said that no two human fingerprints are exactly alike. For that reason, police often use them as evidence to link suspects to crime scenes.

The same goes for silicon chips: Manufacturing processes cause microscopic variations in chips that are unpredictable, permanent, and effectively impossible to clone.

MIT spinout Verayo is now using these unclonable variations to “fingerprint” silicon chips used in consumer-product tags — which can then be scanned via mobile device and authenticated — to aid in the fight against worldwide counterfeiting.

According to a 2013 United Nations report, about 2 to 5 percent of internationally traded goods — including electronics, food, and pharmaceuticals — are counterfeited, costing governments and private companies hundreds of billions of dollars annually.

“This is low-cost authentication using ‘silicon biometrics,’” says Srini Devadas, the Edwin Sibley Webster Professor in MIT’s Department of Electrical Engineering and Computer Science, and Verayo’s co-founder and chief scientist.

Verayo’s technology — now in use worldwide — is based on Devadas’ seminal research into these variations within silicon chips, called “physical unclonable functions” (PUFs), which cause minute speed differences in a chip’s response to electrical signals.

The Verayo technology assigns manufactured chips sets of 128-bit numbers — based on these speed differences — that are stored in a database in the cloud. Integrated into radio frequency identification (RFID) tags, the chips can be scanned by a mobile device or reader that will query the database to determine if the tag is authentic. A different 128-bit number is used for each authentication.

Verayo is currently targeting the consumer-product market, partnering last year with its largest client, Canon Inc., to incorporate Verayo’s chips into RFID tags of cameras being sold across China. Other Verayo clients include gift- and loyalty-card providers. The technology can also be used to identify fake licenses and passports.

Now conducting pilot studies with wineries, the company is also seeking to penetrate the consumables market, which could significantly boost sales, Devadas says. “You can build this chip for a nickel, but you have to sell a lot of these chips to make money,” he says.

But with more than 40 million chips sold worldwide since 2013, Devadas adds, “This is productization and academic success. As far as I’m concerned, this is great.”

Racing signals

PUFs are created during silicon-chip manufacturing, when wires vary in thickness, and the chemical vapor deposition process — used to produce semiconductor wafers — creates microscopic bumps. Depending on these variations, electrons flow with more or less resistance through different paths of the chip, varying processing speeds.

The PUF technology works by “racing” signals across the chips. Two identical electric signals — derived from an input “challenge” — are sent through the chip, at the same time, and assigned two different paths. The signals race toward a latch that measures what signal the chip processed slower or faster — called a “response.” The output is a 1 if one path is faster, and 0 if the other is faster. Repeating the process with different input signals for each race will give a 128-bit number — and it can be repeated hundreds of times.

“Then, suddenly, you have a miniscule probability you’re going to get the same 128-bit resolution for any given race,” Devadas says.

When the tag is scanned, the reader will first identify the tag. Then, it will present the chip with a random challenge of the many that are stored in the database. If the response has 96 or more matching bits, it’s considered authentic. Tags are attached to Canon camera packages, which consumers can scan using smartphones with near-field communication.

In 2002, Devadas and other MIT researchers delivered a seminal paper introducing silicon PUF technology at the Computer and Communications Security Conference, which coined the name and described the first integrated PUF circuit. This March, that paper earned an A. Richard Newton Technical Impact Award from the Institute of Electrical and Electronics Engineers and the Association for Computing Machinery — “which is a test of time for the concept and technology,” Devadas says.

By 2004, Devadas and his students had developed a few dozen bulky, PUF-enabled circuits, labeling each with a human name, such as “Harold,” “Cameron,” and “Dennis.” They stored the speed characteristics of each in a database on their computer; when a given circuit was scanned using a custom reader, its name would pop up on the screen.

This project earned Devadas a grant from the MIT Deshpande Center for Technological Innovation, and several government grants, which helped Verayo launch in its current Silicon Valley headquarters.

Keeping volatile secrets

Although Verayo is focused on the consumer space, the technology has other uses, such as generating “volatile secret keys,” Devadas says, which would only be revealed when activated by voltage.

Because PUF chips do not store such secrets, Devadas says, they need voltage to reveal their unique numeric identification — which could be stored as cryptographic keys. “When the chip powers up, there will be this 128-bit number that gets generated, but it doesn’t exist when the chip is powered down,” Devadas says. “If I don’t have a way of pulling [the key] out, I won’t know what it is.”

This technology has advantages, Devadas says, over traditional nonvolatile data-storage devices, such as flash or erasable programmable read-only memory chips, which retain hackable data even when switched off. These nonvolatile chips are still difficult to break into, he adds, but not as difficult as PUF-enabled chips, which need to be inspected internally when the chip is powered on and the right challenges are applied.

“All of cryptography is based on something remaining secret,” Devadas says. “PUFs are a way of generating those secrets in a more physically secure manner.”

Attracting funding from the Department of Defense, this concept could help, for instance, ensure that drones don’t connect with hacked servers, or that wearables don’t share data with unauthorized servers.

Devadas says the PUF-technology market has seen significant growth in recent years, with other companies now developing in the space. But the competition doesn’t discourage the PUF pioneer — in fact, Devadas is excited about the increased interest.

“It does feel like the world is coming around,” he says. “And we’re still here — that’s the beauty of it.”

This article is published in collaboration with MIT News. Publication does not imply endorsement of views by the World Economic Forum.

To keep up with the Agenda subscribe to our weekly newsletter.

Author: Rob Matheson is a contributing writer for MIT News.

Image: A 12-inch wafer is displayed at Taiwan Semiconductor Manufacturing Company (TSMC) in Xinchu January 9, 2007.  REUTERS/Richard Chung.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

Fourth Industrial Revolution

Related topics:
Emerging TechnologiesFourth Industrial Revolution
Share:
The Big Picture
Explore and monitor how Fourth Industrial Revolution is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

5 ways to achieve effective cyber resilience

Filipe Beato and Jamie Saunders

November 21, 2024

Why AI is Southeast Asia's new engine for profitable growth

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2024 World Economic Forum