SBIR Phase II: Zero-Remanence Tamper-Responsive Cryptokey Memory

Award Information
Agency:
National Science Foundation
Branch
n/a
Amount:
$499,809.00
Award Year:
2007
Program:
SBIR
Phase:
Phase II
Contract:
0724306
Award Id:
79555
Agency Tracking Number:
0539675
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
11409 VALLEY VIEW RD, Suite 345, EDEN PRAIRIE, MN, 55344
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
114264351
Principal Investigator:
James Deak
PhD
(952) 996-1636
jdeak@nve.com
Business Contact:
James Deak
PhD
(952) 996-1636
jdeak@nve.com
Research Institution:
n/a
Abstract
This SBIR Phase II research project is to develop a more secure encryption key for non-volatile memory. Secure ICs often utilize encryption to protect non-volatile memory contents. A clever engineer can recover the key after decapsulating and probing the semiconductor die. NVE intends to produce an innovative non-volatile spintronic cryptographic key memory that will self-erase without data remanence in the event of tampering and without applied power. The main research objectives of this work involve development of a fully integrated 256-bit embedded tamper resistant magnetic random access memory. The technology proposed in this Phase II SBIR program is intended to provide a defense against theft of intellectual property and to protect sensitive data stored in an integrated circuit. Identity theft has become a very large issue for society in general and particularly in the more computerized societies. This is more than a problem of economics, as US military systems have also been reversed engineered by both friendly and unfriendly nations to gain access to US weapons capability. The technology proposed under the Phase II program addresses the need to provide a tighter level of security for data stored on integrated circuit (IC) and IC assemblies. Commercially, this provides an extra layer of protection on IC-based assemblies such as smart cards, cash machines etc. In addition, the proposed program would render a system inoperable in the event of physical tamper. This may be a very useful tool in stemming the tide of fraudulent usage, compromises, and reverse engineering of IC-based instruments as well as certain types of identify theft.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government