industry news
Subscribe Now

GIST Researchers Develop Novel Silk-Based Digital Security Device

With a break time of 5´ 1041 years, this novel digital security system is practically unbreachable, say researchers who developed it
Conventional digital security systems are vulnerable to malicious exploits. However, the incorporation of certain components that cannot be physically copied reduces vulnerability and increases digital security. In a first, researchers from the Gwangju Institute of Science and Technology have devised one such security system using natural silk fibers. The pathbreaking research promises future sustainable and environmentally-friendly security solutions.
 
The global hike in consumerism comes with its own share of problems—counterfeit goods and cyberattacks. Although digital security systems help us combat many of these adverse situations, hundreds of security breaches occur every single year.
One way to address this issue is by using unique physical components that cannot be duplicated or “cloned.” A physical unclonable function (PUF) is a physical feature that takes advantage of microscopic differences in electronics to create unique security “keys.” These keys, when read by an electronic device, help establish or refute the authenticity of the input, thereby either granting or denying access. This paper, which was made available online on January 12, 2022 and published in Nature Communications, researchers from the Gwangju Institute of Science and Technology have designed the first natural PUF. Using native silk fibers obtained from Bombyx mori (domesticated silkworms), the research team designed PUF-based tags. These tags were then used to devise a lens-free, optical (light-based), and portable PUF (LOP-PUF) module.
When a beam of light hits the disordered silk fibers of an optimal density, it causes light diffraction. The nanostructures in individual microfibers enhance the contrast of light intensity with respect to the background. The diffracted light is then captured by an image sensor. Since the pattern of the microholes is naturally-made, it is unique, giving rise to a unique pattern of light,” explains Prof. Young Min Song, senior author and a professor at the Gwangju Institute of Science and Technology.
To achieve the desired intensity and contrast, the researchers experimentally optimized the distance between the silk-based PUF and the image sensor. The assembly also included a light-reflecting mirror and three tricolor light-emitting diodes among other components. Through a series of interventions, the research team processed the captured patterns of light and converted them into a digital format (strings of 0s and 1s).
The results were astounding: the average time required to “fake” the authentication was approximately 5´ 1041 years, thus making the LOP-PUF module a practically unbreachable device. Moreover, the novel security device permitted “digital encryption,” or the conversion of information into a code, to prevent unauthorized access.
“The digital security device we designed is low-cost, portable, eco-friendly, and free of pre- or post-processing. It also does not require a coherent source of light or a bulky lens system. The advantages of this system are manifold,” says Prof. Song.
The team optimized its LOP-PUF design by adding a few tweaks. For example, a cooling fan was added to reduce the “thermal noise,” or the disturbance caused by temperature fluctuations.
Prof. Song muses, “To our knowledge, this is the first PUF module designed using silk, a naturally abundant biomaterial. It means that we don’t need to invest time in developing complicated security keys, nature has already done this for us.”
Silk-based PUFs have indeed secured their place as a pioneering, sustainable and environmentally-friendly digital security solution!

Leave a Reply

featured blogs
Apr 25, 2024
Structures in Allegro X layout editors let you create reusable building blocks for your PCBs, saving you time and ensuring consistency. What are Structures? Structures are pre-defined groups of design objects, such as vias, connecting lines (clines), and shapes. You can combi...
Apr 25, 2024
See how the UCIe protocol creates multi-die chips by connecting chiplets from different vendors and nodes, and learn about the role of IP and specifications.The post Want to Mix and Match Dies in a Single Package? UCIe Can Get You There appeared first on Chip Design....
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...

featured video

How MediaTek Optimizes SI Design with Cadence Optimality Explorer and Clarity 3D Solver

Sponsored by Cadence Design Systems

In the era of 5G/6G communication, signal integrity (SI) design considerations are important in high-speed interface design. MediaTek’s design process usually relies on human intuition, but with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver, they’ve increased design productivity by 75X. The Optimality Explorer’s AI technology not only improves productivity, but also provides helpful insights and answers.

Learn how MediaTek uses Cadence tools in SI design

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

The Future of Intelligent Devices is Here
Sponsored by Alif Semiconductor
In this episode of Chalk Talk, Amelia Dalton and Henrik Flodell from Alif Semiconductor explore the what, where, and how of Alif’s Ensemble 32-bit microcontrollers and fusion processors. They examine the autonomous intelligent power management, high on-chip integration and isolated security subsystem aspects of these 32-bit microcontrollers and fusion processors, the role that scalability plays in this processor family, and how you can utilize them for your next embedded design.
Aug 9, 2023
30,591 views