{"id":35824,"date":"2026-02-22T15:05:38","date_gmt":"2026-02-22T09:20:38","guid":{"rendered":"https:\/\/www.revoscience.com\/en\/?p=35824"},"modified":"2026-02-22T15:05:41","modified_gmt":"2026-02-22T09:20:41","slug":"chip-processing-method-could-assist-cryptography-schemes-to-keep-data-secure","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/chip-processing-method-could-assist-cryptography-schemes-to-keep-data-secure\/","title":{"rendered":"Chip-processing method could assist cryptography schemes to keep data secure"},"content":{"rendered":"\n<p><em><strong>By enabling two chips to authenticate each other using a shared fingerprint, this technique can improve privacy and energy efficiency.<\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-dominant-color=\"2a3c6d\" data-has-transparency=\"false\" style=\"--dominant-color: #2a3c6d;\" loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" src=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp\" alt=\"\" class=\"wp-image-35825 not-transparent\" title=\"\" srcset=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp 900w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-675x450.webp 675w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-768x512.webp 768w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-150x100.webp 150w\" \/><\/figure>\n\n\n\n<p><strong>Cambridge, MA \u2013<\/strong> Just like each person has unique fingerprints, every CMOS chip has a distinctive \u201cfingerprint\u201d caused by tiny, random manufacturing variations. Engineers can leverage this unforgeable ID for authentication, to safeguard a device from attackers trying to steal private data.<\/p>\n\n\n\n<p>But these cryptographic schemes typically require secret information about a chip\u2019s fingerprint to be stored on a third-party server. This creates security vulnerabilities and requires additional memory and computation.<\/p>\n\n\n\n<p>To overcome this limitation, MIT engineers developed a manufacturing method that enables secure, fingerprint-based authentication, without the need to store secret information outside the chip.<\/p>\n\n\n\n<p>They split a specially designed chip during fabrication in such a way that each half has an identical, shared fingerprint that is unique to these two chips. Each chip can be used to directly authenticate the other. This low-cost fingerprint fabrication method is compatible with standard CMOS foundry processes and requires no special materials.<\/p>\n\n\n\n<p>The technique could be useful in power-constrained electronic systems with non-interchangeable device pairs, like an ingestible sensor pill and its paired wearable patch that monitor gastrointestinal health conditions. Using a shared fingerprint, the pill and patch can authenticate each other without a device in between to mediate.<\/p>\n\n\n\n<p>\u201cThe biggest advantage of this security method is that we don\u2019t need to store any information. All the secrets will always remain safe inside the silicon. This can give a higher level of security. As long as you have this digital key, you can always unlock the door,\u201d says Eunseok Lee, an electrical engineering and computer science (EECS) graduate student and lead author of a paper on this security method.<\/p>\n\n\n\n<p>Lee is joined on the paper by EECS graduate students Jaehong Jung and Maitreyi Ashok; as well as co-senior authors Anantha Chandrakasan, MIT provost and the&nbsp;Vannevar Bush Professor of Electrical Engineering and Computer Science, and Ruonan Han, a professor of EECS and a member of the MIT Research Laboratory of Electronics. The research was recently presented at the IEEE International Solid-States Circuits Conference.<\/p>\n\n\n\n<p>\u201cCreation of shared encryption keys in trusted semiconductor foundries could help break the tradeoffs between being more secure and more convenient to use for protection of data transmission,\u201d Han says. \u201cThis work, which is digital-based, is still a preliminary trial in this direction; we are exploring how more complex, analog-based secrecy can be duplicated \u2014 and only duplicated once.\u201d<\/p>\n\n\n\n<p><strong>Leveraging variations<\/strong><\/p>\n\n\n\n<p>Even though they are intended to be identical, each CMOS chip is slightly different due to unavoidable microscopic variations during fabrication. These randomizations give each chip a unique identifier, known as a physical unclonable function (PUF), that is nearly impossible to replicate.<\/p>\n\n\n\n<p>A chip\u2019s PUF can be used to provide security just like the human fingerprint identification system on a laptop or door panel.<\/p>\n\n\n\n<p>For authentication, a server sends a request to the device, which responds with a secret key based on its unique physical structure. If the key matches an expected value, the server authenticates the device.<\/p>\n\n\n\n<p>But the PUF authentication data must be registered and stored in a server for access later, creating a potential security vulnerability.<\/p>\n\n\n\n<p>\u201cIf we don\u2019t need to store information on these unique randomizations, then the PUF becomes even more secure,\u201d Lee says.<\/p>\n\n\n\n<p>The researchers wanted to accomplish this by developing a matched PUF pair on two chips. One could authenticate the other directly, without the need to store PUF data on third-party servers.<\/p>\n\n\n\n<p>As an analogy, consider a sheet of paper torn in half. The torn edges are random and unique, but the pieces have a shared randomness because they fit back together perfectly along the torn edge.<\/p>\n\n\n\n<p>While CMOS chips aren\u2019t torn in half like paper, many are fabricated at once on a silicon wafer which is diced to separate the individual chips.<\/p>\n\n\n\n<p>By incorporating shared randomness at the edge of two chips before they are diced to separate them, the researchers could create a twin PUF that is unique to these two chips.<\/p>\n\n\n\n<p>\u201cWe needed to find a way to do this before the chip leaves the foundry, for added security. Once the fabricated chip enters the supply chain, we won\u2019t know what might happen to it,\u201d Lee explains.<\/p>\n\n\n\n<p><strong>Sharing randomness<\/strong><\/p>\n\n\n\n<p>To create the twin PUF, the researchers change the properties of a set of transistors fabricated along the edge of two chips, using a process called gate oxide breakdown.<\/p>\n\n\n\n<p>Essentially, they pump high voltage into a pair of transistors by shining light with a low-cost LED until the first transistor breaks down. Because of tiny manufacturing variations, each transistor has a slightly different breakdown time. The researchers can use this unique breakdown state as the basis for a PUF.<\/p>\n\n\n\n<p>To enable a twin PUF, the MIT researchers fabricate two pairs of transistors along the edge of two chips before they are diced to separate them. By connecting the transistors with metal layers, they create paired structures that have correlated breakdown states. In this way, they enable a unique PUF to be shared by each pair of transistors.<\/p>\n\n\n\n<p>After shining LED light to create the PUF, they dice the chips between the transistors so there is one pair on each device, giving each separate chip a shared PUF.<\/p>\n\n\n\n<p>\u201cIn our case, transistor breakdown has not been modeled well in many of the simulations we had, so there was a lot of uncertainty about how the process would work. Figuring out all the steps, and the order they needed to happen, to generate this shared randomness is the novelty of this work,\u201d Lee says.<\/p>\n\n\n\n<p>After finetuning their PUF generation process, the researchers developed a prototype pair of twin PUF chips in which the randomization was matched with more than 98 percent reliability. This would ensure the generated PUF key matches consistently, enabling secure authentication.<\/p>\n\n\n\n<p>Because they generated this twin PUF using circuit techniques and low-cost LEDs, the process would be easier to implement at scale than other methods that are more complicated or not compatible with standard CMOS fabrication.<\/p>\n\n\n\n<p>\u201cIn the current design, shared randomness generated by transistor breakdown is immediately converted into digital data. Future versions could preserve this shared randomness directly within the transistors, strengthening security at the most fundamental physical level of the chip,\u201d Lee says.<\/p>\n\n\n\n<p>\u201cThere is a rapidly increasing demand for physical-layer security for edge devices,&nbsp;such as between medical sensors and devices on a body, which often operate under strict energy constraints. A twin-paired PUF approach enables secure communication between nodes without the burden of heavy protocol overhead, thereby delivering both energy efficiency and strong security. This initial demonstration paves the way for innovative advancements in secure hardware design,\u201d Chandrakasan adds.<\/p>\n\n\n\n<p>This work is funded by Lockheed Martin, the MIT School of Engineering MathWorks Fellowship, and the Korea Foundation for Advanced Studies Fellowship.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cambridge, MA \u2013 Just like each person has unique fingerprints, every CMOS chip has a distinctive \u201cfingerprint\u201d caused by tiny, random manufacturing variations.<\/p>\n","protected":false},"author":2,"featured_media":35825,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-35824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp",900,600,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-200x200.webp",200,200,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-675x450.webp",675,450,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-768x512.webp",750,500,true],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp",750,500,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp",900,600,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp",900,600,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0.webp",900,600,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-870x570.webp",870,570,true],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-600x600.webp",600,600,true],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-600x600.webp",600,600,true],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-760x490.webp",760,490,true],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-550x360.webp",550,360,true],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-95x65.webp",95,65,true],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-640x600.webp",640,600,true],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2026\/02\/MIT-PUF-Authent-01_0-150x100.webp",150,100,true]},"author_info":{"info":["RevoScience"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/innovation\/\" rel=\"category tag\">Innovation<\/a>","tag_info":"Innovation","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/35824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=35824"}],"version-history":[{"count":1,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/35824\/revisions"}],"predecessor-version":[{"id":35826,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/35824\/revisions\/35826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/35825"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=35824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=35824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=35824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}