Final published version, 596 KB, PDF document
Available under license: CC BY: Creative Commons Attribution 4.0 International License
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Using quantum effects in nanomaterials for unique identification
AU - Young, Robert James
AU - Roberts, Jonny
AU - Speed, Phillip
PY - 2016/1/5
Y1 - 2016/1/5
N2 - Authentication and identification are critical to information security systems. Traditionally, these processes are achieved with the use of secret keys that are stored in electronic memories, or with difficult-to-clone systems (e.g., fingerprints or holograms). The persistent development of technology, however, means that the barrier to cloning such systems is becoming lower. Moreover, counterfeiting, device spoofing, and identity fraud are formidable problems in all markets. The ideal solution, therefore, would be to produce a nano-fingerprint from the atomic arrangement of a structure embedded within a device. By shrinking down to the atomic scale, the challenge of cloning the system becomes as difficult as possible, i.e., the density of secure information is maximized and the number of resources required to read the fingerprint is minimized.
AB - Authentication and identification are critical to information security systems. Traditionally, these processes are achieved with the use of secret keys that are stored in electronic memories, or with difficult-to-clone systems (e.g., fingerprints or holograms). The persistent development of technology, however, means that the barrier to cloning such systems is becoming lower. Moreover, counterfeiting, device spoofing, and identity fraud are formidable problems in all markets. The ideal solution, therefore, would be to produce a nano-fingerprint from the atomic arrangement of a structure embedded within a device. By shrinking down to the atomic scale, the challenge of cloning the system becomes as difficult as possible, i.e., the density of secure information is maximized and the number of resources required to read the fingerprint is minimized.
U2 - 10.1117/2.1201512.006250
DO - 10.1117/2.1201512.006250
M3 - Journal article
JO - SPIE Newsroom
JF - SPIE Newsroom
ER -