Skip to main content

Researchers close the final loophole in device encryption with the power of nanotubes

ibm and academic researchers use carbon nanotubes for hardware encryption
Image used with permission by copyright holder
Considering the size and semiconducting characteristics of carbon nanotubes, the prospect of using them to replace silicon is quite tempting. Unfortunately, there are a couple of known obstacles preventing that from being possible, at least for now. For those of us less scientifically informed, carbon nanotubes derive from random combinations of metallic and semiconducting nanotubes. As a result, when wiring up a processor, this makes the act of arranging them as needed an excessive engineering challenge.

But a team of researchers has leveraged the aforementioned obstructions to work in their favor. Instead of using carbon nanotubes to create a processor, the group discovered that they could produce cryptographic information by wiring up a section of a chip at random. This randomness lets the nanotubes serve as a means of on-chip, hardware-based encryption.

This is all carried out using a detergent called SDS, which pushes the nanotubes to a part of the chip marked with a positively charged substrate. Notably, this can only be achieved by varying the spacing of the elements in question, thereby preventing a disproportion between attraction and repulsion, and effectively making it possible to handpick just how many locations become populated with carbon nanotubes.

In manually setting the conditions, it’s possible to set a maximum percentage of gates occupied by a nanotube, but not possible to know ahead of time which ones will be occupied. That’s why it’s secure to use this technique as a means of generating an encryption key.

To demonstrate their breakthrough, the researchers built a 64-bit prototype and proved its ability to regularly generate similar keys while also confirming that the process was unaffected by environmental noise. Likewise, the researchers confirmed that over 99 percent of the time, the hardware will generate keys with more than half of their bits completely discernible from one another.

The researches say this technique is even impervious to any attempt to remove the chip from a device to read data bit-by-bit. Since the encryption system comes down to the hardware rather than the software, the processing chip itself would need to be imaged. Although theoretically possible, the researchers say that the chip’s construction makes any attempt to do so likely to destroy the chip entirely, and thus destroy the protected data.

“High-resolution imaging techniques such as electron microscope imaging cannot be used to analyse the bit information,” explain the authors in their write-up. “As the chip de-layering processes (to expose [the nanotubes]) involve harsh plasma etching.”

In doing so, it would close the one remaining loophole that might be used to attack a device with encryption, such as an iPhone, render devices truly secure against any known attack.

Gabe Carey
Former Digital Trends Contributor
A freelancer for Digital Trends, Gabe Carey has been covering the intersection of video games and technology since he was 16…
How to customize mouse gestures on Mac
Apple Magic Mouse on a desk.

Did you know that you can still pull off gestures and haptic tricks with a Mac computer, even without a touchscreen? Such feats are possible, just as long as you own an Apple Magic Mouse. Far more than a sleek-looking desk accessory, the Magic Mouse functions much like a MacBook trackpad. Taps, long presses, swipes, and pinches (among other actions) deliver a number of results, and you’ll be able to customize these commands, too.

Read more
How to delete or hide chats in Microsoft Teams
Running Microsoft Teams on the Galaxy Tab S8.

Microsoft Teams is a terrific workplace platform for keeping the camaraderie strong. Featuring collaborative messaging, video conferencing, and file-sharing tools, it’s your one-stop-shop for in-office, hybrid and at-home workers alike. But anyone with a long history of using Teams will tell you how clogged up your message stockpile can get. Fortunately, deleting and hiding these exchanges is relatively easy to do, and we’ve put together this guide to help.

Read more
Why Llama 3 is changing everything in the world of AI
Meta AI on mobile and desktop web interface.

In the world of AI, you've no doubt heard about what OpenAI and Google have been up to. And now, Meta's Llama LLM (large language model) is becoming an increasingly important player in the game, especially with its open-source nature. Meta recently made a big splash with the launch of its Llama 3 AI model, and it's shaken up the field dramatically.

The reasons why are multiple and varied. It's free to use, it has a wide user base, and yes, it's open source, to name but a few. Here's why Llama 3 is taking the AI industry by storm and may shape its future for some time to come.
Llama 3 is really good
We can debate until the cows come home about how useful AIs like ChatGPT and Llama 3 are in the real world -- they're not bad at teaching you board game rules -- but the few benchmarks we have for how capable these AI are give Llama 3 a distinct advantage.

Read more