{"id":7558,"date":"2016-02-07T06:36:04","date_gmt":"2016-02-07T06:36:04","guid":{"rendered":"http:\/\/revoscience.com\/en\/?p=7558"},"modified":"2016-02-07T06:36:04","modified_gmt":"2016-02-07T06:36:04","slug":"hack-proof-rfid-chips","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/hack-proof-rfid-chips\/","title":{"rendered":"Hack-proof RFID chips"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><em><strong style=\"color: #222222;\">New technology could secure credit cards, key cards, and pallets of goods in warehouses.\u200b<\/strong><\/em><\/span><\/p>\n<figure id=\"attachment_7559\" aria-describedby=\"caption-attachment-7559\" style=\"width: 639px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7559\" src=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg\" alt=\"Researchers have designed an RFID chip that prevents so-called side-channel attacks, which analyze patterns of memory access or fluctuations in power usage when a device is performing a cryptographic operation, in order to extract its cryptographic key. Pictured here is a standard RFID chip.\" width=\"639\" height=\"426\" title=\"\" srcset=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg 639w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0-300x200.jpg 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><figcaption id=\"caption-attachment-7559\" class=\"wp-caption-text\">Researchers have designed an RFID chip that prevents so-called side-channel attacks, which analyze patterns of memory access or fluctuations in power usage when a device is performing a cryptographic operation, in order to extract its cryptographic key. Pictured here is a standard RFID chip.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>CAMBRIDGE, Mass.<\/strong> &#8212;\u00a0Researchers at MIT and Texas Instruments have developed a new type of radio frequency identification (RFID) chip that is virtually impossible to hack.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">If such chips were widely adopted, it could mean that an identity thief couldn\u2019t steal your credit card number or key card information by sitting next to you at a caf\u00e9, and high-tech burglars couldn\u2019t swipe expensive goods from a warehouse and replace them with dummy tags.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Texas Instruments has built several prototypes of the new chip, to the researchers\u2019 specifications, and in experiments the chips have behaved as expected. The researchers presented their research this week at the International Solid-State Circuits Conference, in San Francisco.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">According to Chiraag Juvekar, a graduate student in electrical engineering at MIT and first author on the new paper, the chip is designed to prevent so-called\u00a0<a style=\"color: #1155cc;\" href=\"http:\/\/mit.pr-optout.com\/Tracking.aspx?Data=HHL%3d8%2f98A9-%3eLCE9%3b4%3b8%3f%26SDG%3c90%3a.&amp;RE=MC&amp;RI=4334046&amp;Preview=False&amp;DistributionActionID=28841&amp;Action=Follow+Link\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\">side-channel attacks<\/span><\/a>. Side-channel attacks analyze patterns of memory access or fluctuations in power usage when a device is performing a cryptographic operation, in order to extract its cryptographic key.<\/span><\/p>\n<p style=\"text-align: justify;\">[pullquote]<span style=\"color: #000000;\">According to Chiraag Juvekar, a graduate student in electrical engineering at MIT and first author on the new paper, the chip is designed to prevent so-called\u00a0<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/mit.pr-optout.com\/Tracking.aspx?Data=HHL%3d8%2f98A9-%3eLCE9%3b4%3b8%3f%26SDG%3c90%3a.&amp;RE=MC&amp;RI=4334046&amp;Preview=False&amp;DistributionActionID=28841&amp;Action=Follow+Link\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\">side-channel attacks<\/span><\/a><span style=\"color: #000000;\">.<\/span>[\/pullquote]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">\u201cThe idea in a side-channel attack is that a given execution of the cryptographic algorithm only leaks a slight amount of information,\u201d Juvekar says. \u201cSo you need to execute the cryptographic algorithm with the same secret many, many times to get enough leakage to extract a complete secret.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">One way to thwart side-channel attacks is to regularly change secret keys. In that case, the RFID chip would run a random-number generator that would spit out a new secret key after each transaction. A central server would run the same generator, and every time an RFID scanner queried the tag, it would relay the results to the server, to see if the current key was valid.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Blackout<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Such a system would still, however, be vulnerable to a \u201cpower glitch\u201d attack, in which the RFID chip\u2019s power would be repeatedly cut right before it changed its secret key. An attacker could then run the same side-channel attack thousands of times, with the same key. Power-glitch attacks have been used to circumvent limits on the number of incorrect password entries in password-protected devices, but RFID tags are particularly vulnerable to them, since they\u2019re charged by tag readers and have no onboard power supplies.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Two design innovations allow the MIT researchers\u2019 chip to thwart power-glitch attacks: One is an on-chip power supply whose connection to the chip circuitry would be virtually impossible to cut, and the other is a set of \u201cnonvolatile\u201d memory cells that can store whatever data the chip is working on when it begins to lose power.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">For both of these features, the researchers \u2014 Juvekar; Anantha Chandrakasan, who is Juvekar\u2019s advisor and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Hyung-Min Lee, who was a postdoc in Chandrakasan\u2019s group when the work was done and is now at IBM; and TI\u2019s Joyce Kwong, who did her master\u2019s degree and PhD with Chandrakasan \u2014 use a special type of material known as a ferroelectric crystals.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">As a crystal, a ferroelectric material consists of molecules arranged into a regular three-dimensional lattice. In every cell of the lattice, positive and negative charges naturally separate, producing electrical polarization. The application of an electric field, however, can align the cells\u2019 polarization in either of two directions, which can represent the two possible values of a bit of information.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">When the electric field is removed, the cells maintain their polarization. Texas Instruments and other chip manufacturers have been using ferroelectric materials to produce nonvolatile memory, or computer memory that retains data when it\u2019s powered off.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Complementary capacitors<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">A ferroelectric crystal can also be thought of as a capacitor, an electrical component that separates charges and is characterized by the voltage between its negative and positive poles. Texas Instruments\u2019 manufacturing process can produce ferroelectric cells with either of two voltages: 1.5 volts or 3.3 volts.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The researchers\u2019 new chip uses a bank of 3.3-volt capacitors as an on-chip energy source. But it also features 571 1.5-volt cells that are discretely integrated into the chip\u2019s circuitry. When the chip\u2019s power source \u2014 the external scanner \u2014 is removed, the chip taps the 3.3-volt capacitors and completes as many operations as it can, then stores the data it\u2019s working on in the 1.5-volt cells.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">When power returns, before doing anything else the chip recharges the 3.3-volt capacitors, so that if it\u2019s interrupted again, it will have enough power to store data. Then it resumes its previous computation. If that computation was an update of the secret key, it will complete the update before responding to a query from the scanner. Power-glitch attacks won\u2019t work.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Because the chip has to charge capacitors and complete computations every time it powers on, it\u2019s somewhat slower than conventional RFID chips. But in tests, the researchers found that they could get readouts from their chips at a rate of 30 per second, which should be more than fast enough for most RFID applications.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The MIT researchers&#8217; work was also funded by the Japanese automotive company Denso.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at MIT and Texas Instruments have developed a new type of radio frequency identification (RFID) chip that is virtually impossible to hack.<\/p>\n","protected":false},"author":6,"featured_media":7559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,28],"tags":[],"class_list":["post-7558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-techbiz"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0-150x150.jpg",150,150,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",600,400,false],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",600,400,false],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",540,360,false],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",95,63,false],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",639,426,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",96,64,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/02\/MIT-RFID-Chip_0.jpg",150,100,false]},"author_info":{"info":["Amrita Tuladhar"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/innovation\/\" rel=\"category tag\">Innovation<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/techbiz\/\" rel=\"category tag\">Tech<\/a>","tag_info":"Tech","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/7558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=7558"}],"version-history":[{"count":0,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/7558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/7559"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=7558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=7558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=7558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}