Apparatus and method for generating identification key

ABSTRACT

Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by violating a design rule provided during a semiconductor manufacturing process. The identification key generating apparatus may include an identification key generator to generate an identification key based on whether a contact or a via used to electrically connect conductive layers in a semiconductor chip shorts the conductive layers, and an identification key reader to read the identification key by reading whether the contact or the via shorts the conductive layers.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. application Ser. No. 15/015,985, filedFeb. 4, 2016 (now allowed), which is a continuation of U.S. applicationSer. No. 13/806,628, filed Dec. 21, 2012 (now U.S. Pat. No. 9,292,710),which is a national phase application based on PCT/KR2011/000605, filedon Jan. 28, 2011, which claims the benefit of priority to Korean PatentApplication No. 10-2010-0125633, filed on Dec. 9, 2010, the contents ofall of which are incorporated herein by reference in their entirety.

BACKGROUND 1. Field of the Invention

Exemplary embodiments relate to a digital security field, and moreparticularly, to an apparatus and a method for generating anidentification key used for an encoding and decoding method, a digitalsignature, and the like that may be necessary for security of anelectronic apparatus, embedded system security, system on chip (SoC)security, smart card security, universal subscriber identity module(USIM) security, and the like.

2. Description of the Related Art

As an information-oriented society has been advanced, the necessity forprotection of individual privacy has increased. Thus, a technology forbuilding a security system that may transmit information securely usingencryption and decryption of the information is an essentially requiredand salient technology.

In the advanced information-oriented society, along with a highperformance computer, the use of a computing device in a form of anembedded system or a system on chip (SoC) has rapidly increased. Forexample, the computing devices such as radio-frequency identification(RFID), a smart card, a universal subscriber identity module (USIM), aone-time password (OTP), and the like have been widely used.

In order to build a security system in the computing device, acryptographic-key that is used for encryption and decryption algorithms,or a unique identification may be used. The cryptographic-key or theunique identification will be hereinafter referred to as anidentification key. The identification key is mainly dependent on amethod of externally generating a pseudo random number (PRN) that may becryptographically secure, and storing the PRN in a non-volatile memorysuch as a flash memory, an electrically erasable programmable read-onlymemory (EEPROM), and the like.

With respect to an identification key stored in a computing device,various attacks such as a side channel attack, a reverse engineeringattack, and the like have been recently carried out. In response tothese attacks, Physical Unclonable Function (PUF) technology is beingdeveloped as a method of securely generating and storing anidentification key.

The PUF is a technology for generating an identification key usingsubtle physical characteristic differences that exist in an electronicsystem, and maintaining or storing the identification key as generated,which is also referred to as a hardware fingerprint.

In order to use the PUF as an identification key, first, randomness of agenerated identification key should be sufficient, and second, a valueof the generated identification key should be invariant with respect totime flow or changes in the environment of use.

However, there exist problems with the conventional technologies, suchas sufficient randomness being difficult to obtain, and a generatedidentification key being modified due to changes in physicalcharacteristics according to time flow or due to changes in environmentof use, that have yet to be resolved.

SUMMARY

In one general aspect there is provided an apparatus and a method forgenerating an identification key for the purpose of generating a randomnumber value through a semiconductor manufacturing process, thendeveloping a Physical Unclonable Function (PUF) technology providing thevalue that, once generated, may be time-invariant, and using the PUFtechnology as an identification key.

An aspect of the present invention also provides an apparatus and amethod for generating an identification key that may probabilisticallyguarantee a balancing between a digital value of 0 and a digital valueof 1 in an identification key in a form of a digital value.

An aspect of the present invention also provides an apparatus and amethod for generating an identification key to configure a PUF which maybe manufactured at a relatively low cost and in a simple manner, may bephysically unclonable and, accordingly, may be impervious to an externalattack.

According to an aspect, there is provided an apparatus for generating anidentification key by a probabilistic determination of whether a shortoccurs between nodes constituting a circuit by violating a design ruleprovided during a semiconductor manufacturing process.

According to an aspect, there is provided an apparatus for generating anidentification key including an identification key generator to generatean identification key based on whether a contact or a via, used toelectrically connect conductive layers in a semiconductor chip, shortsthe conductive layers, and an identification key reader to read theidentification key by reading whether the contact or the via shorts theconductive layers.

The identification key generator may include a circuit including acontact or a via that may be designed to be equal to or smaller than asize determined by the design rule provided during the semiconductormanufacturing process. The contact or the via that is designed to bediminutive may probabilistically determine a short between theconductive layers.

After determination of whether the contact or the via shorts theconductive layers is established, a value of a determined result havingan invariant characteristic according to time flow and environment ofuse may be generated once and may remain unchanged.

The identification key generator may set a size of the contact or a sizeof the via so that a probability that the contact or the via shorts theconductive layers, and a probability that the contact or the via failsto short the conductive layers, may be equal. Here, a probability that adigital value generated by the identification key generatorcorresponding to 0, and a probability that a digital value generated bythe identification key generator corresponding to 1 may equallycorrespond to ½, wherein a probability of ½ is equivalent to 50%hereinafter.

The identification key generator may include a circuit to generate a1-bit digital value using a single contact or a single via connecting asingle pair of the conductive layers, and may generate an N-bitidentification key using N circuits.

When a probability that a digital value constituting the N-bitidentification key generated by the identification key generatorcorresponds to 0 and a probability that a digital value constituting theN-bit identification key generated by the identification key generatorcorresponds to 1 are not close to ½, randomness of the generatedidentification key may decrease.

According to an aspect of the present invention, an identification keyprocessing unit to process the identification key in order to secure therandomness of the generated identification key may be further included.

The apparatus for generating the identification key may include theidentification key processing unit to process the identification key byreceiving an input of an identification key read by the identificationkey reader, by grouping digital values constituting the identificationkey based on k bits and generating a plurality of digital value groups,by comparing a first group and a second group among the plurality of thedigital value groups, and by determining a digital value to be 1 when avalue including k digital bits included in the first group is greaterthan a value including k digital bits included in the second group, thedigital value representing the first group and the second group.

Ideally, when the probability of 0 being generated and the probabilityof 1 being generated correspond exactly to ½, the randomness of thegenerated identification key may be secured to the maximum. Theprobability of generating a 0 and the probability of generating a 1,however, may not correspond exactly to ½. Nevertheless, when two groupsare compared by being grouped based on k bits, although the probabilitythat 0 is generated and the probability that 1 is generated may notcorrespond exactly to ½, the two groups may be under an equal conditionand, accordingly, a probability that the first group has a greater valuethan the second group and a probability that the first group has a lowervalue than the second group may become equal.

The first group and the second group may have an equal value and, inthis instance, a digital value representing the first group and thesecond group either may be determined to be one of 1 or 0, or may not bedetermined. Thus, even when in the apparatus for generating theidentification key, the probability that 0 is generated and theprobability that 1 is generated may not correspond exactly to ½, theprobability that 0 is generated and the probability that 1 is generatedmay become equal through the identification processing unit, and therebyrandomness may be secured.

In order to generate an M-bit identification key at the apparatus ofgenerating the identification key including the identification keyprocessing unit, when a grouping is performed based on k bits, M×k bitsmay need to be generated. However, when values of the first group andthe second group are equal, a representative value may not be determinedat times, and thus a circuit may be configured to generate a moresufficient number of bits than the M×k bits.

According to an aspect of the present invention, there is provided anapparatus for generating an identification key, the apparatus includingan identification key generator having a spacing between conductivelayers of a semiconductor, the identification key generator to generatean identification key based on whether a short occurs between theconductive layers of the semiconductor, and an identification key readerto read the identification key by reading whether a short occurs betweenthe conductive layers.

According to an aspect of the present invention, there is provided anapparatus for generating an identification key, the apparatus includingan identification key generator having a spacing between conductivelayers of a semiconductor, the identification key generator to generatean identification key based on whether a short occurs between theconductive layers of the semiconductor, and an identification key readerto read the identification key by reading whether a short occurs betweenthe conductive layers, wherein the spacing between the conductive layersof the semiconductor may be set to a size violating a design ruleprovided during a semiconductor manufacturing process.

The identification key generator may have the spacing between theconductive layers of the semiconductor so that a difference between aprobability of a short occurring between the conductive layers of thesemiconductor and a probability of a short failing to occur between theconductive layers of the semiconductor may fall within a predeterminederror range.

According to an aspect of the present invention, there is also provideda method of generating an identification key, the method includinggenerating an identification key by a probabilistic determination ofwhether a short occurs between nodes constituting a circuit by violatinga design rule provided during a semiconductor manufacturing process, andreading the identification key by reading whether a short occurs betweenthe nodes constituting the circuit.

According to an aspect of the present invention, there is also provideda method of generating an identification key, the method includinggenerating the identification key having a spacing between conductivelayers of a semiconductor, and based on whether a short occurs betweenthe conductive layers of the semiconductor, and reading theidentification key by reading whether a short occurs between theconductive layers, wherein the spacing between the conductive layers ofthe semiconductor is set to a size violating a design rule providedduring a semiconductor manufacturing process.

Effect of the Invention

According to exemplary embodiments, provided are an apparatus and amethod for generating an identification key which may be highly reliablesince the identification key may be randomly generated through asemiconductor manufacturing process, and a value of the identificationkey may be invariant once generated.

According to exemplary embodiments, provided are an apparatus and amethod for generating an identification key which may probabilisticallyguarantee a balancing between a digital value of 0 and a digital valueof 1 in an identification key in a form of a digital value, and therebyrandomness may be secured.

According to exemplary embodiments, provided are an apparatus and amethod for generating an identification key which may be manufactured ata relatively low cost and in a simple manner, may be physicallyunclonable and, accordingly, may be impervious to an external attack.

BRIEF DESCRIPTION OF THE DRAWINGS

These and/or other aspects, features, and advantages of the inventionwill become apparent and more readily appreciated from the followingdescription of exemplary embodiments, taken in conjunction with theaccompanying drawings of which:

FIG. 1 is a diagram illustrating an apparatus for generating anidentification key according to an exemplary embodiment:

FIG. 2 is a diagram describing a configuration of an identification keygenerator according to an exemplary embodiment;

FIG. 3 is a graph describing a configuration of an identification keygenerator according to an exemplary embodiment:

FIG. 4 is a diagram describing a configuration of an identification keygenerator according to an exemplary embodiment;

FIG. 5 is a diagram illustrating a contact array or a via array that mayenable generating an identification key by an identification keygenerator according to an exemplary embodiment:

FIG. 6 is a diagram illustrating a configuration of an identificationkey generator that may generate an identification key using the contactarray or the via array of FIG. 5 according to an exemplary embodiment;

FIG. 7 is a diagram describing a process of processing an identificationkey by an identification key processing unit according to an exemplaryembodiment; and

FIG. 8 is a diagram illustrating a method of generating anidentification key according to an exemplary embodiment.

DETAILED DESCRIPTION

Reference will now be made in detail to exemplary embodiments of thepresent disclosure, examples of which are illustrated in theaccompanying drawings, wherein like reference numerals refer to the likeelements throughout. Exemplary embodiments are described below toexplain the present invention by referring to the figures.

FIG. 1 is a diagram illustrating an apparatus 100 for generating anidentification key according to an exemplary embodiment.

An identification key generator 110 may generate, through asemiconductor process, an identification key that may be invariant totime flow and, although the generated identification key may be random,it may be invariant to time flow.

The identification key generated by the identification key generator 110may correspond to, for example, an N-bit digital value, N being anatural number.

Factors in reliability of an identification key to be generated mayinclude randomness of the generated identification key and invariance ofthe identification key that may be invariant to time flow.

The identification key generator 110 may be configured to haverandomness depending on whether a short occurs between nodes generatedin a semiconductor manufacturing process. In addition, whether the shortoccurs between the nodes may be invariant to time flow and environmentof use and, accordingly, the identification key may be invariant oncegenerated.

The identification key generator 110 may generate an identification keybased on whether conductive layers, for example, metal layers, areshorted by a contact or a via that may be formed between the conductivelayers generated during a semiconductor manufacturing process.

The contact or the via may be designed to connect the conductive layers,and a size of the contact or a size of the via may be commonlydetermined to short the conductive layers. A common design rule maydetermine a minimum size of the contact or the via to guarantee a shortbetween the conductive layers.

However, in the configuration of the identification key generator 110according to an exemplary embodiment, the size of the contact or thesize of the via may be determined to be smaller than a size determinedby the design rule, and thereby a part of the contacts or a part of thevias may short the conductive layers, and the other part of the contactsor the other part of the vias may not short the conductive layers. Here,whether the short occurs may be probabilistically determined.

In a conventional semiconductor process, when a contact or a via failsto short conductive layers, although the process may be considered tohave failed, it may be used for generating an identification key havingrandomness.

Setting of the size of the contact or the size of the via according tothe above-described embodiment will be further described with referenceto FIG. 2 and FIG. 3.

According to another embodiment of the present invention, theidentification key generator 110 may generate an identification keyhaving randomness by a probabilistic determination of whether a shortoccurs between conductive lines, by determining a spacing between theconductive lines to be less than a size determined by a design rule,during a semiconductor manufacturing process.

The above-described embodiment may be used to generate a randomidentification key by violating design rules, which may guarantee anopening between the conductive lines, that is, a spacing greater than apredetermined level, during a conventional semiconductor manufacturingprocess.

Setting of the spacing between the conductive lines will be furtherdescribed with reference to FIG. 4.

The identification key generator 110 may electrically generate thegenerated identification key according to the above-described embodimentof the present invention. Whether a contact or a via shorts conductivelayers or a short occurs between conductive lines may be identifiedusing a read transistor, a configuration of which will be furtherdescribed with reference to FIG. 6.

In an embodiment using a size adjustment of the contact or the via, evenwhen a ratio of the contact or the via that shorts the conductive layersby adjusting a size of the contact or the via and a ratio of the contactor the via that fails to short the conductive layers may be adjusted tohave an equal probability corresponding to ½, it may be possible that anexactly equal ratio between the case that the short occurs (for example,a digital value of 0) and the opposite case (for example, a digitalvalue of 1) may not be probabilistically guaranteed.

That is, as the size of the contact or the via becomes closer to a valuedetermined by a design rule, a probability of a short occurring maybecome greater, and conversely, as the size of the contact or the viabecomes smaller than the value determined by the design rule, aprobability of a short failing to occur may become greater. When one ofthe probabilities of the short occurring and the probability of theshort failing to occur becomes greater, randomness of a generatedidentification key may decrease.

The same issue may arise in an exemplary embodiment of adjusting of thespacing between the conductive lines as above-described.

Thus, the apparatus 100 for generating the identification key mayfurther include an identification key processing unit 130 to process theidentification key generated by the identification key generator 110,which may increase or guarantee randomness. Although the termidentification key processing unit may be used to refer to referencenumeral 130 in this disclosure, the present disclosure is not limited tothis specific exemplary embodiment.

An operation of the identification key processing unit 130 will befurther described with reference to FIG. 7.

FIG. 2 is a diagram describing a configuration of an identification keygenerator according to an exemplary embodiment.

In FIG. 2, a configuration of vias that may be formed between a metal 1layer 202 and a metal 2 layer 201 during a semiconductor manufacturingprocess is illustrated.

In a group 210 here vias may be set to a sufficient size as determinedby a design rule, all of the vias may short the metal 1 layer 202 andthe metal 2 layer 201, and whether a short occurs may be indicated as adigital value of 0.

In a group 230 where vias may be set to a small size, all of the viasmay not short the metal 1 layer 202 and the metal 2 layer 201. Here,whether a short occurs may be indicated by a digital value of 1.

In a group 220 where vias are set to a medium size between the size ofthe group 210 and the size of the group 230, part of the vias may shortthe metal 1 layer 202 and the metal 2 layer 201, and the other part ofthe vias may not short the metal 1 layer 202 and the metal 2 layer 201.

Similar to the group 220, the identification key generator 110 may beconfigured by setting a size of vias so that part of the vias may shortthe metal 1 layer 202 and the metal 2 layer 201, and the other part ofthe vias may not short the metal 1 layer 202 and the metal 2 layer 201.

A design rule with respect to a size of a via may be different dependingon a semiconductor manufacturing process. For example, when a designrule of a via is set to 0.25 μm during a complementarymetal-oxide-semiconductor (CMOS) process of 0.18 μm, the identificationkey generator 110 may set a size of a via as 0.19 μm, and therebyenabling a probabilistic distribution of whether a short occurs betweenmetal layers.

An ideal probability of a short occurring with respect to theprobability distribution of whether the short occurs may correspond to aprobability of 50%. The identification key generator 110 may beconfigured by setting a size of a via to correspond to the idealprobability distribution or as close as possible to the probabilitydistribution of 50%. In certain embodiments, the size of the via may bedetermined in accordance with a process-based experiment.

FIG. 3 is a graph describing a configuration of an identification keygenerator according to an exemplary embodiment.

As confirmed in the graph, as a size of a via becomes greater, aprobability that a short occurs between metal layers may be close to 1.A size of a via determined by a design rule may correspond to Sd whichmay be a value to sufficiently guarantee a short between the metallayers.

Sm may be a size of a via at which a probability of whether a shortoccurs between the metal layers may theoretically correspond to 0.5. Smmay have a different value based on a process, and in certainembodiments, an approximate value, although not exact, may be found inaccordance with a process-based experiment.

In the identification key generator 110, whether a short occurs betweenthe metal layers may be set to 0.5, within a range of Sx1 (not shown)and Sx2 (not shown) that may have a predetermined allowable error. Here.Sx1 and Sx2 may be near to the shown Sx, and may correspond to a sizehaving a predetermined margin.

FIG. 4 is a diagram describing a configuration of an identification keygenerator according to an embodiment of the present invention.

According to another embodiment of the present invention, whether ashort occurs between metal lines may be probabilistically determined byadjusting a spacing between the metal lines.

In a group 410 where a spacing between metal lines may be set to berelatively narrow to guarantee or increase the probability of a shortbetween the metal lines, a short may occur between the metal lines inall cases.

In a group 430 where a spacing between the metal lines may be set to berelatively large, a short may not occur between the metal lines in allcases.

Similar to a group 420, the identification key generator 110 may set aspacing where a probability that a short occurs between the metal linesis such that part of the metal lines may be shorted and the other partof the metal lines may not be shorted.

FIG. 5 is a diagram illustrating a contact array or a via array that maybe formed on a semiconductor layer in order to generate anidentification key by the identification key generator 110 according toan exemplary embodiment.

In FIG. 5, a configuration of vias formed between metal layers that maybe layered on a semiconductor substrate is illustrated, including M viasin width (or a horizontal alignment) and N vias in length (or a verticalalignment), that is, M×N vias in total, M and N being natural numbers.

The identification key generator 110 may generate a M×N-bitidentification key based on whether each of the M×N vias either shortsthe metal layers (a digital value of 0), or fails to short the metallayers (a digital value of 1).

The generated M×N-bit identification key may be read by theidentification key reader 120.

FIG. 6 is a diagram illustrating a configuration of a circuit of theidentification key generator 120 according to an exemplary embodiment.

The identification key generator 120 may identify digital logic valuesusing a read transistor between a reference voltage VDD and a ground.

In an example of FIG. 6 including a pull-down circuit, when anindividual via in the identification key generator 110 shorts metallayers, an output value may correspond to 0, and when an individual viafails to short metal layers, an output value may correspond to 1, andthus, the identification key generator 110 may generate anidentification key. Although not described in greater detail, adescription with respect to the pull-down circuit is extended to anexample of a configuration including a pull-up circuit.

An identification key may be generated in a similar manner in anexemplary embodiment using a short between metal lines.

Although a single exemplary embodiment of a configuration of theidentification key generator 120 of FIG. 6 is described, the presentdisclosure is not limited to the specific exemplary embodiment.

Thus, in the case of a configuration that may generate a digital valueby determining whether a short occurs between metal layers or betweenmetal lines in the identification key generator 110, variousmodifications and variations can be made without departing from thespirit of the disclosure or the scope of the disclosure.

The identification key generated by the identification key generator 110may be transmitted to and stored in the identification key reader 120.The identification key reader 120 may correspond to a register or aflip-flop (not shown) that may receive an input of the generatedidentification key, and may store the generated identification key.

In certain embodiments, the identification key reader 120 may correspondto the register or the flip-flop as well as other configurationsanalogous to the register or the flip-flop that may read and store thegenerated identification key.

FIG. 7 is a diagram describing a process of processing an identificationkey by an identification key processing unit according to an exemplaryembodiment.

The identification key processing unit 130 may group M×N-bit digitalvalues generated by the identification key generator 110 based on apredetermined number.

Although conceptual grouping of the digital values has been describedwith reference to FIG. 7, the present invention is not limited to thedescribed exemplary embodiment. Those skilled in the art may appreciatethat in certain embodiments, the identification key reader 120 includingregisters or flip-flops may group the registers or the flip-flops.

In FIG. 7, four digital values may be grouped into a single group.

The identification processing unit 130 may compare 4-bit digital valuesgenerated by each of a group 710 and a group 720. When the 4-bit digitalvalue of the group 710 may be greater than the 4-bit digital value ofthe group 720, a digital value representing the group 710 and the group720 may be determined to be 1.

Conversely, when the 4-bit digital value of the group 710 may be lessthan the 4-bit digital value of the group 720, the digital valuerepresenting the group 710 and the group 720 may be determined to be 0.

In certain embodiments, when the 4-bit digital value of the group 720may be greater than the 4-bit digital value of the group 710, therepresentative digital value may be determined to be 1.

When the 4-bit digital value of the group 710 and the 4-bit digitalvalue of the group 720 may be equal, the representative digital valueeither may be determined to be one of 1 and 0, or may be indeterminate.

Using this scheme, an identification key may be determined using thegenerated identification key by generating the representative digitalvalue using the comparison of a group 730 and a group 740, and by thelike.

The above description may be described as a process of processing theidentification key to increase randomness of the identification key.

In the identification key generator 110, when a ratio of a shortoccurring (a digital value of 0), and a ratio of a short failing tooccur (a digital value of 1) are different, a balancing between 0 and 1may not be performed at times. Here, a probability that 1 is generated,and a probability that 0 is generated with respect to each bit may bedifferent from 50%. However, since two groups may be equivalent, aprobability that one of the two groups may have a digital value greaterthan the other of the two groups may correspond to 50%. Thus, aprobabilistic balancing between 0 and 1 may be performed through theabove-described process.

When the originally generated identification key corresponds to M×Nbits, the identification key may be determined by the identification keyprocessing unit 130 of FIG. 7 and may correspond to M×N/8 bits since anew 1-bit digital value may be determined using an 8-bit digital value.

The above description with respect to a process of grouping or a processof processing the identification key by the identification keyprocessing unit 130 is not limited to an exemplary embodiment, andmodifications to and variations of the process of processing theidentification key for maintaining a balance between the digital valueof 0 and the digital value of 1 can be made without departing from thespirit of the disclosure or the scope of the disclosure.

The new identification key that may be generated by the identificationkey generator 110 and determined by the identification key processingunit 130 may have randomness, and may become a reliable value that may,in theory, remain invariant once generated.

According to embodiments of the present invention, a reliableidentification key having a characteristic of a random number that maybe invariant according to time flow may be easily manufactured atrelatively low manufacturing costs.

The random identification key may be generated during a semiconductormanufacturing process, and the identification key may be invariant afterthe manufacturing has been completed, and thus a process of externallyinputting the identification key to a non-volatile memory, in aconventional scheme, may be unnecessary. Thus, a process of externallyinputting and outputting the identification key may be absent, and evenwhen a design drawing for a semiconductor chip is leaked, because theidentification key may be generated based on a difference of physicalcharacteristics during a manufacturing process, the identification keymay be unclonable and provide considerably excellent security. Also,since the manufacturing process of the non-volatile memory may beunnecessary, manufacturing costs may be reduced.

FIG. 8 is a diagram illustrating a method of generating anidentification key according to an exemplary embodiment.

In operation 810, the identification key generator 110 may generate anidentification key.

The identification key generator 110 may be configured to haverandomness in whether a short occurs between nodes generated during asemiconductor manufacturing process. In addition, a characteristic ofwhether the short occurs between the nodes may be physically invariantand, accordingly, the identification key may be invariant oncegenerated.

The identification key generator 110 may generate an identification keybased on whether a short occurs between a contact or a via that may beformed between conductive layers generated during a semiconductormanufacturing process. Setting of a size of the contact or a size of thevia is as described above with reference to FIG. 2 and FIG. 3.

The identification key generator 110 may adjust a spacing betweenconductive lines during a semiconductor manufacturing process so thatpart of the conductive lines shorts and the other part of the conductivelines fails to short, thereby generating an identification key havingrandomness. The embodiment is as described above with reference to FIGS.4 through 6.

In operation 820, the identification key reader 120 may store thegenerated identification key using a register or a flip-flop. Ingeneration of the identification key and reading of the identificationkey, whether the contact or the via shorts either conductive layers orconductive lines may be identified using a read transistor, which is asdescribed above with reference to FIG. 6.

In operation 830, the identification key processing unit 130 may processthe identification key generated by the identification key generator110, and thus may guarantee randomness.

The process of processing the identification key is as described abovewith reference to FIG. 7.

The above-described exemplary embodiments of the present disclosure maybe recorded in non-transitory computer-readable media including programinstructions to implement various operations embodied by a computer. Themedia may also include, alone or in combination with the programinstructions, data files, data structures, and the like. Examples ofnon-transitory computer-readable media include magnetic media such ashard disks, floppy disks, and magnetic tape; optical media such as CDROM discs and DVDs; magneto-optical media such as optical discs; andhardware devices that are specially configured to store and performprogram instructions, such as read-only memory (ROM), random accessmemory (RAM), flash memory, and the like. Examples of programinstructions include both machine code, such as code produced by acompiler, and files containing higher level code that may be executed bythe computer using an interpreter. The described hardware devices may beconfigured to act as one or more software modules in order to performthe operations of the above-described exemplary embodiments of thepresent invention, or vice versa.

Although a few exemplary embodiments of the present invention have beenshown and described, the present disclosure is not limited to thedescribed exemplary embodiments. Instead, it would be appreciated bythose skilled in the art that changes may be made to these exemplaryembodiments without departing from the principles and spirit of theinvention, the scope of which is defined by the claims and theirequivalents.

What is claimed is:
 1. A semiconductor chip for generating anidentification key, the chip comprising: an identification key generatorcircuit, including: a plurality of two layers; and a plurality ofcontacts or vias formed between the plurality of two layers, a hole sizeof at least one contact or via among the plurality of contacts or viasbeing greater than a hole size at which the contact or via never createsa short between the two layers, and less than a minimum hole size atwhich the contact or via always creates the short between the twolayers, wherein the identification key generator circuit generates anidentification key based on an electrical characteristic of a contact orvia between two layers and wherein the electrical characteristic of thecontact or via between the two layers remains invariant over any periodof time; and an identification key reader circuit that reads theidentification key by reading the electrical characteristic of thecontact or via between the two layers constituting the identificationkey generator circuit.
 2. The chip of claim 1, wherein the electricalcharacteristic of the contact or via is determined by whether the shortor open occurs between the two layers.
 3. The chip of claim 2, whereinthe two layers constituting the identification key generator circuitcorrespond to conductive layers of a semiconductor, and theidentification key generator circuit generates the identification keybased on whether a contact or a via formed between the conductive layersof the semiconductor shorts the conductive layers.
 4. The chip of claim3, wherein the identification key reader circuit reads theidentification key by reading whether the contact or the via shorts theconductive layers.
 5. The chip of claim 3, wherein the hole size and theminimum hole size are based on a semiconductor manufacturing process. 6.The chip of claim 2, wherein the identification key generator circuithas N unit configurations to generate a 1-bit digital value using singlecontact or via connecting two layers, and thereby generates an N-bitidentification key using the N unit configurations, N being a naturalnumber.
 7. The chip of claim 6, further comprising an identification keyprocessing unit to process the identification key by receiving an inputof an N-bit digital value read by an identification key reader circuit,by grouping N-bit digital values based on k bits, by comparing a firstgroup and a second group among a plurality of the grouped groups, and bydetermining a digital value to be 1 when a value including k digitalbits included in the first group is greater than a value including kdigital bits included in the second group, the digital valuerepresenting the first group and the second group, and k being a naturalnumber.
 8. The chip of claim 7, wherein, when the value including the kdigital bits included in the first group is equal to the value includingthe k digital bits included in the second group, the identification keyprocessing unit determines the digital value representing the firstgroup and the second group to be one of 1 and 0, or fails to determinethe digital value representing the first group or the second group,selectively based on settings.
 9. A semiconductor chip for generating anidentification key, the chip comprising: an identification key generatorcircuit, including layers of a semiconductor, the layers having aspacing smaller than a spacing at which a short between the layers neveroccurs, and larger than a minimum spacing at which the short between thelayers always occurs, wherein the identification key generator circuitgenerates an identification key based on an electrical characteristicbetween the layers and wherein the electrical characteristic between thelayers remains invariant over any period of time; and an identificationkey reader circuit that reads the identification key by reading theelectrical characteristic between the layers.
 10. The chip of claim 9,wherein the electrical characteristic between the layers is determinedby whether the short or an open occurs between the layers.
 11. The chipof claim 10, wherein the identification key generator circuit has Npairs of layers having the same spacing, wherein each of the N pairs ofthe layers generates a 1-bit digital value based on whether a shortoccurs between the layers, and thus, generates an N-bit identificationkey, N being a natural number.
 12. The chip of claim 11, furthercomprising an identification key processing unit to process theidentification key by receiving an input of the N-bit digital value readby an identification key reader circuit, by grouping N-bit digitalvalues based on k units, by comparing a first group and a second groupamong a plurality of the grouped groups, and by determining a digitalvalue to be 1 when a value including k digital bits included in thefirst group is greater than a value including k digital bits included inthe second group, the digital value representing the first group and thesecond group, and k being a natural number.
 13. The chip of claim 12,wherein, when the value including the k digital bits included in thefirst group is equal to the value including the k digital bits includedin the second group, the identification key processing unit determinesthe digital value representing the first group and the second group tobe one of 1 and 0, or fails to determine the digital value representingthe first group or the second group, selectively based on settings. 14.A method of generating an identification key, the method comprising:generating an identification key based on an electrical characteristicof a contact or via between two layers constituting a circuit, thecircuit including a plurality of contacts or vias formed between aplurality of two layers and a hole size of a contact or via among theplurality of contacts or vias being greater than a hole size at whichthe contact or via does not create the short, and smaller than a minimumhole size at which the contact or via creates the short, wherein theelectrical characteristic of the contact or via between the two layersremains invariant over any period of time; and reading theidentification key by reading whether the electrical characteristic ofthe contact or via between the two layers constituting the circuit. 15.The method of claim 14, wherein the electrical characteristic of thecontact or via is determined by whether the short or open occurs betweenthe two layers.
 16. The method of claim 15, wherein the two layersconstituting the circuit correspond to conductive layers of asemiconductor, and the generating of the identification key generatesthe identification key based on whether the contact or via formedbetween the conductive layers of the semiconductor shorts the conductivelayers.
 17. The method of claim 16, wherein the reading of theidentification key comprises reading whether the contact or via shortsthe conductive layers.
 18. The method of claim 16, wherein the firsthole size and the second hole size are selected based on a semiconductormanufacturing process.
 19. The method of claim 15, wherein thegenerating of the identification key uses N unit configurations togenerate a 1-bit digital value using a single contact or via to connecta single pair of conductive layers, and generates an N-bitidentification key using the N unit configurations, N being a naturalnumber.
 20. The method of claim 19, further comprising processing anidentification key to process the identification key by receiving aninput of an N-bit digital value read in the reading of theidentification key, by grouping N-bit digital values based on k units,by comparing a first group and a second group among a plurality of thegrouped groups, and by determining a digital value to be 1 when a valueincluding k digital bits included in the first group is greater than avalue including k digital bits included in the second group, the digitalvalue representing the first group and the second group, and k being anatural number.