shutterstock_1041066730.jpg

PUF-based Security Function IP

Security building blocks

Security Function IP Overview

A PUF-based unique identity generation method derives from NeoPUF. It can help you get rid of all security concerns and cost for hardware security modules and key injection processes by generating inside the chip.

icon-01.jpg
PUFuid
icon-02.jpg
PUFkeyst

A PUF-based methodology for secure storage by entangling with NeoPUF. It not only preventssecrets from being stolen through physical attacks, but also reaches high level security without involving crypto algorithms.

icon-03.jpg
PUFtrng

An entropy assisting PUF-based design to generate the true random number generator. It doesn’t have a complex design for high-quality entropy and post-processing, which leads to high-speed throughput and low power consumption.

icon-04.jpg
PUFkeygen

A comprehensive solution for PUF-based key generation. It provides multiple advantages for your design with all PUF-based IPs, such as secure UID generation inside the chip, high-speed throughput for session keys, etc.

icon-05.jpg
PUFenc

A PUF-based cryptographic key that provides a unique feature for the crypto engine. It eliminates the need for OTP to store cryptographic keys and prevents the key from being stolen by hackers.

A PUF-based authentication utilizes AES, a key protection for shared secrets and high-quality nonce to achieve a robust authentication. It can protect against the prediction attacks for the nonce and physical attacks for the shared secret.

icon-06.jpg
PUFauth