Product piracy long ago ceased to be limited exclusively to the consumer goods sector.
Industry, too, is increasingly having to battle this problem. Cheap fakes cost business dear: the German mechanical and plant engineering sector alone lost 6,4 billion Euros of revenue in 2010, according to a survey by the German Engineering Federation, VDMA. Sales losses aside, low-quality counterfeits can also damage a company‘s brand image. Worse, they can even put people‘s lives at risk if they are used in areas where safety is paramount, such as automobile or aircraft manufacture. Patent rights or organisational provisions such as confidentiality agreements are no longer sufficient to prevent product piracy. Today’s commercially available anti-piracy technology provides a degree of protection, but it no longer constitutes an insurmountable obstacle for the product counterfeiters. Criminals are using scanning electron microscopes, focused ion beams or laser bolts to intercept security keys – and adopting increasingly sophisticated methods.
No two chips are the same
At embedded world, researchers from the Fraunhofer Institute for Secure Information Technology (SIT) will be demonstrating how electronic components or chips can be made counterfeit-proof using physical unclonable functions (PUFs). ”Every component has a kind of individual fingerprint since small differences inevitably arise between components during production”, explains Dominik Merli, a scientist at Fraunhofer SIT in Garching near Munich. Printed circuits, for instance, end up with minimal variations in thickness or length during the manufacturing process. While these variations do not affect functionality, they can be used to generate a unique code.
Invasive attacks destroy the structure
A PUF module is integrated directly into a chip – a setup that is feasible not only in a large number of programmable semiconductors such as FPGAs, but equally in hardware components such as microchips and smartcards. “At its heart is a measuring circuit, for instance a ring oscillator. This oscillator generates a characteristic clock signal which allows the chip‘s precise material properties to be determined. Special electronic circuits then read these measurement data and generate the component-specific key from the data,” explains Merli. Unlike conventional cryptographic processes, the secret key is not stored on the hardware but is regenerated as and when required. Since the code relates directly to the system properties at any given point in time, it is virtually impossible to extract and clone it. Invasive attacks on the chip would alter physical parameters, thus distorting or destroying the unique structure.
The Garching-based researchers have already developed two prototypes: a butterfly PUF and a ring oscillator PUF. At present, these modules are being optimised for practical applications.
© Technews Publishing (Pty) Ltd | All Rights Reserved