{"id":100588,"date":"2015-02-26T09:12:56","date_gmt":"2015-02-26T14:12:56","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=100588"},"modified":"2015-12-30T16:38:56","modified_gmt":"2015-12-30T21:38:56","slug":"qr-codes-engineered-into-cybersecurity-protection","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2015\/02\/qr-codes-engineered-into-cybersecurity-protection\/","title":{"rendered":"QR Codes Engineered into Cybersecurity Protection"},"content":{"rendered":"<p>QR, or Quick Response, codes \u2013 those commonly black and white boxes that people scan with a smartphone to learn more about something \u2013 have been used to convey information about everything from cereals to cars and new homes.<\/p>\n<p class=\"wp-image-100376 size-medium\">But, University of Connecticut (UConn) researchers think the codes have a greater potential: protecting national security.<\/p>\n<p>Using advanced 3-D optical imaging and extremely low light photon counting encryption, Board of Trustees Distinguished Professor Bahram Javidi and his research team have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can be used to protect the integrity of computer microchips. The <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6685832\">findings<\/a> were published in IEEE Photonics Journal.<\/p>\n<p>\u201cAn optical code or QR code can be manufactured in such a way that it is very difficult to duplicate,\u201d said Javidi, whose team is part of UConn\u2019s Center for Hardware Assurance, Security, and Engineering (CHASE) in the School of Engineering. \u201cBut if you have the right keys, not only can you authenticate the chip, but you can also learn detailed information about the chip and what its specifications are.<\/p>\n<p>\u201cAnd, that is important to the person using it.\u201d<\/p>\n<figure id=\"attachment_100376\" aria-describedby=\"caption-attachment-100376\" style=\"width: 416px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2015\/02\/QRCode1.jpg\"><img decoding=\"async\" class=\"wp-image-100376 size-full img-responsive lazyload\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2015\/02\/QRCode1.jpg\" alt=\"A 3.15 mm QR code storing an encrypted and compressed image shown placed on an integrated circuit and an image of the QR code placed next to a dime. (Courtesy of Adam Markman\/Brhram Javidi)\" width=\"416\" height=\"170\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2015\/02\/QRCode1.jpg 416w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2015\/02\/QRCode1-300x122.jpg 300w\" data-sizes=\"(max-width: 416px) 100vw, 416px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 416px; --smush-placeholder-aspect-ratio: 416\/170;\" \/><\/a><figcaption id=\"caption-attachment-100376\" class=\"wp-caption-text\">A 3.15 mm QR code storing an encrypted and compressed image shown placed on an integrated circuit and an image of the QR code placed next to a dime. (Courtesy of Adam Markman\/Brhram Javidi)<\/figcaption><\/figure>\n<p>Corrupted and recycled integrated circuits or microchips posed a significant threat to the international electronics supply chain. Bogus or used computer chips may not matter much when they cause poor cell phone reception or an occasional laptop computer crash in personal use. But the problem becomes exponentially more serious when counterfeit or hacked chips turn up in the U.S. military.<\/p>\n<p>The problem has been exacerbated in recent years by the fact that much of the national production of microcircuits has moved offshore, where prices are lower but ensuring quality control is more difficult.<\/p>\n<p>In 2012, a Senate Armed Services Committee report found that more than 100 cases of suspected counterfeit electronics parts from China had made their way into the Department of Defense supply chain. In one notable example, officials said counterfeit circuits were used in a high-altitude missile meant to destroy incoming missiles. Fixing the problem cost the government $2.675 million, the report said.<\/p>\n<p>Unlike commercial QR codes, Javidi\u2019s little black and white boxes can be scaled as small as microns or a few millimeters and would replace the electronic part number that is currently stamped on most microchips.<\/p>\n<p>Javidi says he can compress vital information about a chip \u2013 its functionality, capacity, and part number \u2013 directly into the QR code so it can be obtained by the reader without accessing the Internet. This is important in cybersecurity circles, because linking to the Internet greatly increases vulnerability to hacking or corruption. Javidi&#8217;s work with QR codes was supported in part by the National Science Foundation.<\/p>\n<p>To further protect the information in the QR code, Javidi applies an optical imaging \u201cmask\u201d that scrambles the QR code design into a random mass of black-and-white pixels that look similar to the snowy images one might see on a broken TV. He then adds yet another layer of security through a random phase photon-based encryption that turns the snowy image into a darkened nighttime sky with just a few random stars or dots of pixilated light.<\/p>\n<p>The end result is a self-contained, highly secure, information-laden microscopic design that is nearly impossible to duplicate. Only individuals who have the special corresponding codes could decrypt the QR image.<\/p>\n<p>And that is important to all of us.<\/p>\n<aside class=\"grey-sidebar full-sidebar\">\n  <\/p>\n<h3>Rising Awareness About Cybersecurity<\/h3>\n<p>Given the fact that the most common passwords for computer users are not secure at all \u2013 \u201cpassword\u201d and \u201c12345\u201d \u2013 cybersecurity is an issue that should be a concern to even the personal user.<\/p>\n<p>That was the message recently conveyed by a panel of cybersecurity experts hosted by the Center of Excellence for Security Innovation (CSI), a collaboration between UConn School of Engineering and Comcast.<\/p>\n<p>Donna Dodson, chief cybersecurity advisor for the National Institute of Standards and Technology (NIST), told the audience at Wilbur Cross that getting individuals as well as companies to think about cybersecurity is the first step toward a more secure network.<\/p>\n<p>\u201cI may not understand the mechanics of my car, but I know it\u2019s my responsibility to keep it safe,\u201d said Dodson, the featured speaker at the event.<\/p>\n<p>Toward that end, the NIST wrote a guidebook for the public, titled \u201cFramework for Improving Critical Infrastructure Cybersecurity,\u201d which provides a \u201ccommon language\u201d for people. \u201cIt promotes concepts of resiliency and protecting your environment,\u201d Dodson said.<\/p>\n<p>UConn\u2019s Mark Tehranipoor, director of CSI, said raising awareness about cybersecurity concerns should begin early. \u201cWe really have to take it down to the undergraduate level and even bring it down to high school level.\u201d<\/p>\n<p>It was a sentiment reiterated by Liam Randall of Critical Stack, an Ohio-based company that specializes in network security. For every person working on preventing attacks, he said, someone else is working on new ways to carry out such attacks.<\/p>\n<p>\u201cWhen you look at the impact that one person can have, that really keeps me up at night,\u201d he said.<\/p>\n<p>Based on the panel discussion, the impact of a single person can apply to the common user as well as the hacker.<br \/>\n<\/aside>\n","protected":false},"excerpt":{"rendered":"<p>Engineers took the ordinary QR code and transformed it into a high-end cybersecurity application that can protect the integrity of computer microchips.<\/p>\n","protected":false},"author":12,"featured_media":100649,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1866,2076,2227],"tags":[],"magazine-issues":[],"coauthors":[44],"class_list":["post-100588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engr","category-research","category-uconn-edu-homepage"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 06:28:24","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/100588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=100588"}],"version-history":[{"count":11,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/100588\/revisions"}],"predecessor-version":[{"id":107929,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/100588\/revisions\/107929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/100649"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=100588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=100588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=100588"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=100588"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=100588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}