Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security
Lead Author: Dr. Meng-Yi Wu, Dr. Kai-Hsin Chuang In a secure chip, the keys, which constitute the hardware root of trust (HRoT) of the chip, must be fully protected. An HRoT is the most important design in chip security, providing fundamental trust (root keys), hardware identification code (UID), hardware unique keys (HUK), and entropy. Consequently, […]
Hardware Security Book Series 2: PUF-based Solutions and Applications
Lead Author: Lawrence Liu A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers […]
Why Hardware Root of Trust Needs Anti-Tampering Design
Foreword As the development of AIoT advanced in more diversified applications, such as artificial intelligence, image recognition, intelligent sensing, or smart healthcare, endpoint devices are exposed to more information security risks than ever. The technology boom also brings more security needs, so ensuring that devices are secure and trusted is critical. All layers of the […]
PUFrt: Solving Chip Security’s Weakest Link
In the 19th century, Netherland’s cryptographer, Auguste Kerckhoff, created Kerckhoffs’s principle, stating that “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.”