(a) At monolayer thickness, this material has the optical properties of a semiconductor that emits light. At multilayer, the properties change and the material doesn’t emit light. (b) Varying the thickness of each layer results in a thin film speckled with randomly occurring regions that alternately emit or block light. (c) Upon exposure to light, this pattern can be translated into a one-of-a-kind authentication key that could secure hardware components at minimal cost.
NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial
The next generation of electronic hardware security may be at hand as researchers at New York University Tandon School of Engineering introduce a new class of unclonable cybersecurity security primitives made of a low-cost nanomaterial with the highest possible level of structural randomness. Randomness is highly desirable for constructing the security primitives that encrypt and thereby secure computer hardware and data physically, rather than by programming.
In a paper published in the journal ACS Nano, Assistant Professor of Electrical and Computer Engineering Davood Shahrjerdi and his NYU Tandon team offer the first proof of complete spatial randomness in atomically thin molybdenum disulfide (MoS2). The researchers grew the nanomaterial in layers, each roughly one million times thinner than a human hair. By varying the thickness of each layer, Shahrjerdi explained, they tuned the size and type of energy band structure, which in turn affects the properties of the material.
“At monolayer thickness, this material has the optical properties of a semiconductor that emits light, but at multilayer, the properties change, and the material no longer emits light. This property is unique to this material,” he said. By tuning the material growth process, the resulting thin film is speckled with randomly occurring regions that alternately emit or do not emit light. When exposed to light, this pattern translates into a one-of-a-kind authentication key that could secure hardware components at minimal cost.
Shahrjerdi said his team was pondering potential applications for what he described as the beautiful random light patterns of MoS2 when he realized it would be highly valuable as a cryptographic primitive.
This represents the first physically unclonable security primitive created using this nanomaterial. Typically embedded in integrated circuits, physically unclonable security primitives protect or authenticate hardware or digital information. They interact with a stimulus — in this case, light — to produce a unique response that can serve as a cryptographic key or means of authentication.
The research team envisions a future in which similar nanomaterial-based security primitives can be inexpensively produced at scale and applied to a chip or other hardware component, much like a postage stamp to a letter. “No metal contacts are required, and production could take place independently of the chip fabrication process,” Shahrjerdi said. “It’s maximum security with minimal investment.”
Learn more:Â THE ULTIMATE DEFENSE AGAINST HACKERS MAY BE JUST A FEW ATOMS THICK
The Latest on: Cybersecurity
- Event: Measuring Success in Cybersecurityon August 3, 2022 at 6:13 pm
Is the United States any safer in cyberspace than it was a year ago? If so, how could we prove it? If not, how should we reallocate resources to get there? These are questions that we hope can be ...
- A cybersecurity expert on TikTok flagged the biggest mistakes average people make onlineon August 3, 2022 at 3:28 pm
A cybersecurity worker offers advice on protecting and preserving your data, avoiding hacking and more in a TikTok series.
- How IT Teams Can Use 'Harm Reduction' for Better Cybersecurity Outcomeson August 3, 2022 at 2:25 pm
Copado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
- Cybersecurity: Humans weakest link in the chainon August 3, 2022 at 12:10 pm
By Neelesh Kripalani What if someone tells you that the small fortune you invested in the latest cybersecurity solution may not be protecting you as expected? Yes, despite the most sophisticated ...
- New report details cybersecurity challenges and strategies in the middle marketon August 3, 2022 at 9:16 am
In recent years, cybersecurity has been a considerable concern for middle market companies, although the specific threats are constantly in flux. Last year was no different, as organizations ...
- Take Your Cybersecurity Seriously With This MacPaw Appon August 3, 2022 at 8:00 am
MACPAW CleanMyMac X is an all-in-one Mac cleaner that removes gigabytes of unnecessary junk and malware. The app doesn't just clean your computer; it fixes issues. When you run CleanMyMac X, it ...
- 5 Ways Chess Can Inspire Strategic Cybersecurity Thinkingon August 3, 2022 at 7:00 am
With interest in chess booming, here are five ways in which strategic chess play can inspire the next generation of cybersecurity experts. 1. Understand Weaknesses. Chess, unlike ...
- New cybersecurity tool simplifies site evaluationson August 3, 2022 at 5:26 am
As federal sites invest in distributed energy resources (DERs) like solar panels and battery backups, investments in cybersecurity must also be considered. More energy resources create more complexity ...
- Mitigating Cybersecurity Risks For Hybrid Work Environmentson August 3, 2022 at 5:15 am
Although a hybrid work model can reduce operating costs, it does require more input toward shoring up security measures.
- The Cybersecurity Skills Gap From A Former Hacker’s POV: The Need For Speedon August 3, 2022 at 4:15 am
This article outlines what both practitioners and executives need to do to help close the cybersecurity skills gap.
via Google News and Bing News