Preventing SoC from the threats of hardware IP privacy, reverse-engineering, physical tampering and counterfeiting is an emerging topic and becoming more important.
While SoC serves as the trust anchor, hardware-based security enables and enhances the secure operation of the whole system.
PUFsecurity provides hardware-based fundamental IP cores in SoCs with major offerings as follows:
1) Block-Ciphers (Advance Encryption Standard algorithm)
Provide complete IP of standard AES algorithm with chain modes (e.g. ECB/CBC/CFB/OFB…, etc.) and flexible key lengths of 128, 192 or 256 bits.
2) Asymmetric Public-key Cryptography (Elliptic Curve Cryptography algorithm)
Provide complete IP of ECC algorithm with primary & binary curves which are compliant with NIST standards.
3) Integrity with SHA (Secure Hash Algorithm)
Provide complete IP of SHA2 / SHA3 with different digest values (e.g. 224, 256, 384, or 512 bits).
4) Protocol Support of Authentication
Provide MAC IP of SHA2-HMAC, AES-CMAC
5) Protocol Support of Key-Agreement and Digital Signature
Provide ECDH, ECDSA IP
We would like to highlight that in order to comply with the security requirement of the Chinese Government and meet the demands of China’s market, we also provide algorithms mentioned below. These comply with recommended China’s cryptography algorithms in OSCCA
All of the crypto IPs above are digital RTL designs which is flexible enough to be integrated into PUFiot and PUFse solutions within a secure boundary. By cooperating with the root of trust core PUFrt, these crypto IPs can enhance the hardware security level of SoCs in an efficient way.