New technology could secure credit cards, key cards, and pallets of goods in warehouses.
Researchers at MIT and Texas Instruments have developed a new type of radio frequency identification (RFID) chip that is virtually impossible to hack.
If such chips were widely adopted, it could mean that an identity thief couldn’t steal your credit card number or key card information by sitting next to you at a café, and high-tech burglars couldn’t swipe expensive goods from a warehouse and replace them with dummy tags.
Texas Instruments has built several prototypes of the new chip, to the researchers’ specifications, and in experiments the chips have behaved as expected. The researchers presented their research this week at the International Solid-State Circuits Conference, in San Francisco.
According to Chiraag Juvekar, a graduate student in electrical engineering at MIT and first author on the new paper, the chip is designed to prevent so-called side-channel attacks. Side-channel attacks analyze patterns of memory access or fluctuations in power usage when a device is performing a cryptographic operation, in order to extract its cryptographic key.
“The idea in a side-channel attack is that a given execution of the cryptographic algorithm only leaks a slight amount of information,” Juvekar says. “So you need to execute the cryptographic algorithm with the same secret many, many times to get enough leakage to extract a complete secret.”
One way to thwart side-channel attacks is to regularly change secret keys. In that case, the RFID chip would run a random-number generator that would spit out a new secret key after each transaction. A central server would run the same generator, and every time an RFID scanner queried the tag, it would relay the results to the server, to see if the current key was valid.
Such a system would still, however, be vulnerable to a “power glitch” attack, in which the RFID chip’s power would be repeatedly cut right before it changed its secret key. An attacker could then run the same side-channel attack thousands of times, with the same key. Power-glitch attacks have been used to circumvent limits on the number of incorrect password entries in password-protected devices, but RFID tags are particularly vulnerable to them, since they’re charged by tag readers and have no onboard power supplies.
Two design innovations allow the MIT researchers’ chip to thwart power-glitch attacks: One is an on-chip power supply whose connection to the chip circuitry would be virtually impossible to cut, and the other is a set of “nonvolatile” memory cells that can store whatever data the chip is working on when it begins to lose power.
For both of these features, the researchers — Juvekar; Anantha Chandrakasan, who is Juvekar’s advisor and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Hyung-Min Lee, who was a postdoc in Chandrakasan’s group when the work was done and is now at IBM; and TI’s Joyce Kwong, who did her master’s degree and PhD with Chandrakasan — use a special type of material known as a ferroelectric crystals.
As a crystal, a ferroelectric material consists of molecules arranged into a regular three-dimensional lattice. In every cell of the lattice, positive and negative charges naturally separate, producing electrical polarization. The application of an electric field, however, can align the cells’ polarization in either of two directions, which can represent the two possible values of a bit of information.
When the electric field is removed, the cells maintain their polarization. Texas Instruments and other chip manufacturers have been using ferroelectric materials to produce nonvolatile memory, or computer memory that retains data when it’s powered off.
A ferroelectric crystal can also be thought of as a capacitor, an electrical component that separates charges and is characterized by the voltage between its negative and positive poles. Texas Instruments’ manufacturing process can produce ferroelectric cells with either of two voltages: 1.5 volts or 3.3 volts.
The researchers’ new chip uses a bank of 3.3-volt capacitors as an on-chip energy source. But it also features 571 1.5-volt cells that are discretely integrated into the chip’s circuitry. When the chip’s power source — the external scanner — is removed, the chip taps the 3.3-volt capacitors and completes as many operations as it can, then stores the data it’s working on in the 1.5-volt cells.
When power returns, before doing anything else the chip recharges the 3.3-volt capacitors, so that if it’s interrupted again, it will have enough power to store data. Then it resumes its previous computation. If that computation was an update of the secret key, it will complete the update before responding to a query from the scanner. Power-glitch attacks won’t work.
Because the chip has to charge capacitors and complete computations every time it powers on, it’s somewhat slower than conventional RFID chips. But in tests, the researchers found that they could get readouts from their chips at a rate of 30 per second, which should be more than fast enough for most RFID applications.
“In the age of ubiquitous connectivity, security is one of the paramount challenges we face,” says Ahmad Bahai, chief technology officer at Texas Instruments. “Because of this, Texas Instruments sponsored the authentication tag research at MIT that is being presented at ISSCC. We believe this research is an important step toward the goal of a robust, low-cost, low-power authentication protocol for the industrial Internet.”
Learn more: Hack-proof RFID chips
The Latest on: Hack-proof RFID chips
via Google News
The Latest on: Hack-proof RFID chips
- Mikey Sklar On The Daily Showon May 8, 2022 at 5:00 pm
Yesterday’s The Daily Show (8-23-06) had a segment featuring friend of Hack-A-Day Mikey Sklar. You probably remember his projects: Making RFID proof pockets, embedding an RFID chip in his hand ...
- Telangana AI Mission & NASSCOM Enable Market Access for AI Startupson May 5, 2022 at 10:44 pm
enterprises may choose to provide a proof-of-concept opportunity to select startups. The event’s conclusion saw two startups being identified by enterprises for deeper engagement. A few more ...
- ATtiny Chip Abused In RFID Applicationon April 23, 2022 at 5:00 pm
As a show of its ability to thrive under adverse conditions, [Trammell Hudson] was able to shoehorn an ATtiny into an RFID circuit in a way that tests the limits of the chip design. The RFID ...
- Eeki Foods Raises $6.5M Series A in a Round led by General Catalyst (GC)on April 19, 2022 at 2:10 am
So, they are setting up large-scale, climate-proof farms equipped with proprietary growing chambers that allow low-cost production of high-quality vegetables. “The fresh funds will be used to ...
- All You Need To Know About Nol Card Balanace Transferon March 22, 2022 at 9:54 am
There was a new technology which is called RFID that stands for Radio-frequency identification, where an NFC chip operates as one part of a wireless link, so small amounts of data do get ...
- Panasonic AI-driven cameras empower an expanding vision of new useson December 17, 2021 at 8:58 pm
AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of ...
- Beyond cyber security: Why physical security must be a key element of data protectionon December 20, 2018 at 7:37 am
She didn’t hack the system, she simply used a flash drive ... ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic) ...
via Bing News