Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Foreword/postscript
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Foreword/postscript
}
TY - CHAP
T1 - Foreword to "Using Imperfect Semiconductor Systems for Unique Identification"
AU - Young, Robert James
A2 - Roberts, Jonny
PY - 2017/12/1
Y1 - 2017/12/1
N2 - This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
AB - This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
U2 - 10.1007/978-3-319-67891-7
DO - 10.1007/978-3-319-67891-7
M3 - Foreword/postscript
SN - 9783319678900
T3 - Springer Theses
BT - Using Imperfect Semiconductor Systems for Unique Identification
PB - Springer
CY - Cham
ER -