You are here

SBIR Phase II: Zero-Remanence Tamper-Responsive Cryptokey Memory

Award Information
Agency: National Science Foundation
Branch: N/A
Contract: 0724306
Agency Tracking Number: 0539675
Amount: $499,809.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: EL
Solicitation Number: NSF 05-557
Solicitation Year: 2005
Award Year: 2007
Award Start Date (Proposal Award Date): N/A
Award End Date (Contract End Date): N/A
Small Business Information
11409 VALLEY VIEW RD Suite 345
United States
DUNS: 114264351
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 James Deak
 (952) 996-1636
Business Contact
 James Deak
Title: PhD
Phone: (952) 996-1636
Research Institution

This SBIR Phase II research project is to develop a more secure encryption key for non-volatile memory. Secure ICs often utilize encryption to protect non-volatile memory contents. A clever engineer can recover the key after decapsulating and probing the semiconductor die. NVE intends to produce an innovative non-volatile spintronic cryptographic key memory that will self-erase without data remanence in the event of tampering and without applied power. The main research objectives of this work involve development of a fully integrated 256-bit embedded tamper resistant magnetic random access memory. The technology proposed in this Phase II SBIR program is intended to provide a defense against theft of intellectual property and to protect sensitive data stored in an integrated circuit. Identity theft has become a very large issue for society in general and particularly in the more computerized societies. This is more than a problem of economics, as US military systems have also been reversed engineered by both friendly and unfriendly nations to gain access to
US weapons capability. The technology proposed under the Phase II program addresses the need to provide a tighter level of security for data stored on integrated circuit (IC) and IC assemblies. Commercially, this provides an extra layer of protection on IC-based assemblies such as smart cards, cash machines etc. In addition, the proposed program would render a system inoperable in the event of physical tamper. This may be a very useful tool in stemming the tide of fraudulent usage, compromises, and reverse engineering of IC-based instruments as well as certain types of identify theft.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government