Anti-counterfeiting: Mixing the Physical and the Digital World
Counterfeiting is as old as the human desire to create objects of value. For example, historians have identified counterfeit coins just as old as the corresponding originals. Archeological findings have identified examples of counterfeit coins from 500 BC netting a 600+% instant profit to the counterfeiter . Test cuts were likely to be the first counterfeit detection procedure – with an objective to test the purity of the inner structure of the coin. The appearance of counterfeit coins with already engraved fake test cuts initiated the cat-and-mouse game between counterfeiters and original manufacturers that has lasted to date .
KeywordsCredit Card Illegal Trade Substantial Revenue Malicious Party Business Software Alliance
- 2.K. Barry, Counterfeits and Counterfeiters: The Ancient World. Available on-line at: http://www.ancient-times.com/newsletters/n13/n13.html.
- 3.D.W. Bauder, Personal CommunicationGoogle Scholar
- 4.D.W. Bauder, An Anti-Counterfeiting Concept for Currency Systems. Research Report PTK-11990, Sandia National Labs, Albuquerque, NM, 1983Google Scholar
- 5.M. Bellare, P. Rogaway, in The Exact Security of Digital Signatures How to Sign with RSA and Rabin. EUROCRYPT (Springer-Verlag, Berlin, Heidelberg, 1996), pp. 399–414Google Scholar
- 6.P. Britt, Credit Card Skimming: Growing Trend or Media Hype? Transaction World Magazine, September, 2001. Available on-line at: http://www.transactionworld.com/articles/2001/september/riskmanagement1.asp
- 8.S. Church, D. Littman, Machine reading of Visual Counterfeit Deterrent Features and Summary of US Research, 1980–1990. Four Nation Group on Advanced Counterfeit Deterrence, Canada, 1991.Google Scholar
- 9.J. Collins, RFID fibers for secure applications. RFID J. (2004). Available on-line at: http://www.rfidjournal.com/article/articleview/845/1/14.
- 10.Commission on Engineering and Technical Systems (CETS), Counterfeit Deterrent Features for the Next-Generation Currency Design. (The National Academic Press, Washington, DC, 1993)Google Scholar
- 11.Creo, Inc, Available on-line at: http://www.creo.com
- 12.CrossID, Inc, Firewall Protection for Paper Documents. Available on-line at: http://www.rfidjournal.com/article/articleview/790/1/44.
- 13.G. DeJean, D. Kirovski, in Radio Frequency Certificates of Authenticity. IEEE Antenna and Propagation Symposium (IEEE Computer Society Press, Los Alamitos, CA, USA, 2006)Google Scholar
- 14.G. DeJean, D. Kirovski, in RF-DNA: Radio-Frequency Certificates of Authenticity. Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science, vol. 4727 (Springer, Berlin, Heidelberg, 2007), pp. 346–363Google Scholar
- 15.T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. Internet draft, available on-line at: http://www.ietf.org/internet-drafts/draft-ietf-tls-trfc4346-bis-09.tx.
- 16.P.P. Ewald, Ann. Phys. 49, 1–56 (1915)Google Scholar
- 17.B. Gassend, D. Clarke, M. van Dijk, S. Devadas, in Silicon Physical Random Functions. ACM Computer and Communication Security Conference (ACM, New York, NY, USA, 2002)Google Scholar
- 18.J. Guajardo, S. Kumar, G. Schrijen, P. Tuyls, in FPGA Intrinsic PUFs and Their Use for IP Protection. Cryptographic Hardware and Embedded Systems (Springer-Verlag, Berlin, Heidelberg, New York, 2007)Google Scholar
- 19.IEEE 1363-2000: Standard Specifications For Public Key Cryptography, 2000. Available on-line at: http://grouper.ieee.org/groups/1363
- 20.Inkode, Inc, Available on-line at: http://www.inkode.com.
- 21.D. Kirovski, in Toward an Automated Verification of Certificates of Authenticity. ACM Electronic Commerce (ACM, New York, NY, USA, 2004) pp. 160–169Google Scholar
- 22.P. Kocher, J. Jaffe, B. Jun, in Differential Power Analysis. CRYPTO, (Springer-Verlag, Berlin, Heidelberg, 1999) pp. 388–397Google Scholar
- 23.J.-W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, in A Technique to Build a Secret Key in Integrated Circuits with Identification and Authentication Applications. IEEE VLSI Circuits Symposium (IEEE Press, 2004)Google Scholar
- 24.K. Lofstrom, W.R. Daasch, D. Taylor, in IC Identification Circuit Using Device Mismatch. IEEE ISSCC, 2000, pp. 372–373Google Scholar
- 25.Microwave Engineering Europe, CAD benchmark. Oct 2000 – Feb 2001. Available on-line at: http://i.cmpnet.com/edtn/europe/mwee/pdf/CAD.pdf
- 27.R. Pappu, Physical One-Way Functions. Ph.D. thesis, MIT, 2001Google Scholar
- 30.RF SAW, Inc, Available on-line at: http://www.rfsaw.com/tech.html
- 31.G.J. Simmons, in Identification of Data, Devices, Documents and Individuals. IEEE International Carnahan Conference on Security Technology (IEEE Press, 1991) pp. 197–218Google Scholar
- 32.B. Škorić. On the entropy of keys derived from laser speckle, In Journal of optics A: Pure and Applied Optics Create an alert, vol. 10, no. 5 (IOP Publishing, UK, Mar 2008)Google Scholar
- 33.A.N. Tikhonov, V.A. Arsenin, Solution of Ill-posed Problems. (Winston & Sons, Washington, 1977)Google Scholar
- 34.P. Tuyls, B. Škorić, Strong authentication with physical unclonable functions. in Security, Privacy and Trust in Modern Data Management, ed. by M. Petković, W. Jonker. Data-Centric Systems and Applications (Springer, 2007)Google Scholar
- 35.E. Wolf, A generalized extinction theorem and its role in scattering theory. in Coherence and Quantum Optics, ed. by L. Mandel, E. Wolf. (Plenum, New York, NY, 1973)Google Scholar