A PUF-based Crypto Coprocessor

PUFcc is a Crypto Coprocessor IP that combines a Hardware Root of Trust with a full suite of cryptographic algorithms, forming an adaptable security IP module suitable for integration into a wide array of system architectures. This ‘off the shelf’ solution allows designers to ‘drop and play’ a complete IP solution that enables a system’s required security protocols hassle-free.

Security on Chip has become instrumental in unlocking the full potential of IoT, AI, Automotive, and Fintech Technologies. Major incidents highlight the importance of chip security in protecting against different types of attacks throughout the product lifecycle. While software alone can only mitigate vulnerabilities to a certain degree, hardware methods establish firm foundations for device security as it expands protection starting from the design.

PUFcc has five main components along with their corresponding sub-blocks. The security foundation of PUFcc comes from the PUFrt Hardware Root of Trust that has our patterned PUF circuit design, which is stored in a secure OTP with an anti-tamper shell and forms the root keys. Included are the NIST CAVP certified and OSCCA standards-compliant crypto accelerators, with ciphers, hashes, and key derivation. Individual modules control the APB and AXI interfaces, in conjunction with a direct memory access module (DMA), for faster access to external memories that need to interact with the crypto coprocessor. PUFcc is also equipped with a sequencer (SQC) to spare the need for a processor or boot ROM. Finally, the optional fifth component of PUFcc is the extendable enclave to include the external Flash into the secure boundary. A list of the components and their sub-blocks can be found in the feature session and the downable datasheet.

By incorporating supportive crypto hardware, we arrive at a True PUF-based Crypto Coprocessor. The all-in-one integrated solution is capable of taking care of all required security functions throughout the product lifecycle. Such compact design can also maintain a security boundary for keeping sensitive information or assets intact. Finally, products and services become secure as protection from the hardware level extends all the way to OS and APPs.

Application

PUFcc can support the following:

  • TEE security enhancement
  • Key processing and generation
  • Instant key wrapping or indirect key wrapping
  • Key hierarchy build and advanced management
  • Secure boot
  • Anti-cloning and asset protection by using local key encryption
  • TLS protocol
  • To extend protection for external Flash

Features

  • Cryptography engines supporting all elliptic curves
  • NIST CAVP certified and OSCCA standards complied
  • AXI or APB interface for direct memory access
  • APB control interface with secure/non-secure access privilege
  • Four 256-bits hardware PUF fingerprints with self health-check that could be used as a unique identification(UID) or a root key(seed)
  • 8k-bit mass production OTP with built-in instant hardware encryption (customization available)
  • Comprehensive anti-tamper designs in physical and RTL
  • High-quality true random number generator
The design architecture of PUCcc

Evaluation Kit

If you are interested in the PUFcc, you can apply for the evaluation kit through our free evaluation program IP GO.