Skip to content
PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

  • Products
  • Technology
  • Resources
  • Company
    • Newsroom
    • About Us
    • Certifications and Awards
    • Markets
    • Careers
    • Contact
  • En

PUF

2022 - 01 - 06

PUF

Physically unclonable functions (PUFs) are used in hardware security primarily for chip identification and authentication. PUFs for semiconductor devices utilize natural cellular-level variations inherent in silicon to create an unclonable, unique device response to a given input.

2022 - 01 - 05

Anti-tamper Design

Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.

2022 - 01 - 05

TRNG  

True Random Number Generators or TRNGs take this to the hardware level as a physical process. Typically, they generate random numbers from one or several entropy sources.

2022 - 01 - 05

Quantum Tunneling

As the first step in establishing any cybersecurity ecosystem, the process of key generation must remain reliably secure. Software-based key generation algorithms introduce various risk factors into the process, such as key management and key injection, along with the added costs required to support such processes. Thus, the safest solution is the simplest, generating an inborn root key at the hardware level through the use of a built-in PUF. There are many physical processes upon which a PUF can be built (over 40 to date), but one stands out above the rest, based on the mechanism known as Quantum Tunneling.

2022 - 01 - 04

Anti-Fuse OTP

One-Time-Programmable Memory (OTP) is a type of non-volatile memory (NVM), and for most applications, it is the industry standard for single-use memory.

OTP replaces Read-only memory (ROM) in applications such as IDs, production records, encryption code, etc. It is also suitable for analog trimming, function selection, and parameter setting and has been used in a broad range of applications. Since the stored data can’t be changed after being programmed, it is a fundamental element in building a Hardware Root of Trust.

2022 - 01 - 04

Hardware Root of Trust

Trust (RoT) underpins all Secure Operations on a chip and protects its critical assets. It provides a unique and unforgeable foundation from which a device builds its security architecture and authenticate each computing layer, from hardware to application.

Recent Posts

The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification

Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security

Hardware Security Book Series 2: PUF-based Solutions and Applications

Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair

Hardware Security Book Series 1: Quantum Tunneling PUF

Tags

anti-tampering Arm Chiplet Crypto Coprocessor crypto currency cryptogaphy Flash Protection Hardware Security IoT OTP postquantumcryptography PQC PSA Certified PUF PUFcc PUFcc7 PUFrt RISC-V Architechure Root of Trust Secure OTP security SRAM Repair STB Supply Chain TLS White Paper Zero Trust

Subscribe to our Newsletter!

    Your address email

    • PUFrt
    • Secure OTP
    • PUFcc
    • Flash Protection
    • PUFhsm
    • Newsroom
    • About us
    • Markets
    • Careers
    • Contact
    • Terms of Use
    • Privacy Policy
    • YouTube
    • Facebook
    • LinkedIn
    • Twitter

    © 2019 - 2026 pufsecurity. All Rights Reserved.