Difference between revisions of "Unclonable Identifier"
From MgmtWiki
(→References) |
(→Solutions) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
− | An [[Unclonable | + | An [[Unclonable Identifier]] is based on some physical measurement that cannot be reproduced else where. |
==Context== | ==Context== | ||
Line 18: | Line 18: | ||
# SRAM - naturally comes with defects that can be read out. Many patents and products are now available using this to hide a crypto key<ref>Intrinsic ID, ''QuiddiKey reliably reconstructs the same cryptographic key under all environmental circumstances'' https://www.intrinsic-id.com/products/quiddikey/</ref> or create an RFID chip.<ref>R. Colin Johnson, Unclonable 'silicon DNA' ''secures RFID tags'' EE Times (2010-03-02) https://www.eetimes.com/document.asp?doc_id=1173168</ref> | # SRAM - naturally comes with defects that can be read out. Many patents and products are now available using this to hide a crypto key<ref>Intrinsic ID, ''QuiddiKey reliably reconstructs the same cryptographic key under all environmental circumstances'' https://www.intrinsic-id.com/products/quiddikey/</ref> or create an RFID chip.<ref>R. Colin Johnson, Unclonable 'silicon DNA' ''secures RFID tags'' EE Times (2010-03-02) https://www.eetimes.com/document.asp?doc_id=1173168</ref> | ||
# Quantum - which are completely unclonable, but hard to maintain over any period of time longer than a second. Application have been found in establishing secure communications channels. | # Quantum - which are completely unclonable, but hard to maintain over any period of time longer than a second. Application have been found in establishing secure communications channels. | ||
+ | # [https://news.osu.edu/scientists-harness-chaos-to-protect-devices-from-hackers/ Computer chips with “uncountable” secrets] (2021-04-07) Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. | ||
==References== | ==References== |
Latest revision as of 16:07, 10 April 2021
Full Title or Meme
An Unclonable Identifier is based on some physical measurement that cannot be reproduced else where.
Context
- Security Tokens have existed since prehistory using some physical stamp with wax or ink to create an impression that could not be duplicated with then existing technology.
- The most common private Identifier on the web today is a Private Key that is created and kept secret by the owner of the key.
- Most naturally occurring materials will have some random characterizes which are randomly disbursed throughout the material.
Problem
- To function as an Identifier, the material object needs to have some element of randomness that can be read out of the object producing some repeatable string.
- It is still necessary to ensure that it is the material object that is being read, and not just a replay of a prior read out.
Solutions
Lots of attempts have been made to create a physical unclonable function (PUF), some of which are listed here.
- Optical - puts scattered defects in an optical media that have been called a "Speckle Pattern".
- Coating - puts a pattern on the top of, for example, a silicon chip that can be read by the chip, but is covered by a material which is opaque and part of the pattern's read out capability.
- Delay - based on delays in materials, like silicon, that are able to be reliably read out.
- SRAM - naturally comes with defects that can be read out. Many patents and products are now available using this to hide a crypto key[1] or create an RFID chip.[2]
- Quantum - which are completely unclonable, but hard to maintain over any period of time longer than a second. Application have been found in establishing secure communications channels.
- Computer chips with “uncountable” secrets (2021-04-07) Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.
References
- ↑ Intrinsic ID, QuiddiKey reliably reconstructs the same cryptographic key under all environmental circumstances https://www.intrinsic-id.com/products/quiddikey/
- ↑ R. Colin Johnson, Unclonable 'silicon DNA' secures RFID tags EE Times (2010-03-02) https://www.eetimes.com/document.asp?doc_id=1173168