RadioRadar - Datasheets, service manuals, circuits, electronics, components, CAD
Sitemap
Russian version
You read:

Latest Electronics News and Product Design Updates from New Electronics

 
Electronics News

Archive : 24 March 2026 год


16:00MIT Pioneers Two-Chip Authentication for Secure Cryptographic Schemes

Researchers at MIT have developed a groundbreaking CMOS fabrication technique that enables two chips to share a unique physical “fingerprint”, allowing them to authenticate each other directly without storing secret keys on third-party servers. The new “twin PUF” method significantly improves hardware security, privacy, and energy efficiency for edge devices and IoT systems.

MIT twin PUF two-chip authentication concept

MIT’s twin PUF: two chips sharing a unique physical fingerprint for direct authentication

How the Twin PUF Works

During wafer processing (before dicing), specially designed transistor structures are placed along the edges of two adjacent dies and connected via metal layers. On-chip photodiodes harvest energy from LED illumination to power the circuit. This energy induces controlled gate-oxide breakdown in selected transistors. Because of natural manufacturing variations, the breakdown times differ randomly, creating unique electrical states - the PUF fingerprint.

In the twin configuration, four transistors (two on each chip) share the same breakdown event, resulting in complementary but perfectly matched responses. After dicing, the two chips form a matched pair with correlated randomness, similar to tearing a piece of paper in half where the edges match uniquely.

Twin PUF fabrication process with gate-oxide breakdown

Fabrication process: shared gate-oxide breakdown powered by photovoltaic energy from LED

Key Performance Results

  • Average consistency between twin-chip fingerprints: 98.4%
  • Inter-die Hamming distance: ~50% (excellent randomness)
  • Native bit-error rate: 0.4%
  • Successfully passed NIST SP 800-22 statistical randomness tests

Advantages Over Traditional PUFs

  • Eliminates the need for third-party servers to store challenge-response data or enroll devices
  • Removes cryptographic keys from non-volatile memory, protecting against extraction attacks
  • Enables direct device-to-device authentication with minimal power and communication overhead
  • Compatible with standard 65-nm CMOS process - no major changes to existing fabrication lines
Comparison traditional PUF vs MIT twin PUF

Traditional PUF vs MIT Twin PUF: removing server dependency

Potential Applications

The technology is especially promising for:

  • Medical devices (e.g., ingestible sensors paired with wearables)
  • Low-power IoT and edge nodes with intermittent connectivity
  • Secure industrial sensors and controllers
  • Any paired embedded systems requiring strong hardware-level trust

This approach brings hardware security closer to the physical layer, making cryptographic schemes more robust and suitable for resource-constrained environments.

MIT twin PUF prototype 128x8 PUF array

Prototype: 128 × 8 PUF cell arrays fabricated in 65-nm CMOS