PUF
Physically unclonable functions (PUFs) are used in hardware security primarily for chip identification and authentication. PUFs for semiconductor devices utilize natural cellular-level variations inherent in silicon to create an unclonable, unique device response to a given input.
Anti-tamper Design
Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.
TRNG
True Random Number Generators or TRNGs take this to the hardware level as a physical process. Typically, they generate random numbers from one or several entropy sources.
Quantum Tunneling
As the first step in establishing any cybersecurity ecosystem, the process of key generation must remain reliably secure. Software-based key generation algorithms introduce various risk factors into the process, such as key management and key injection, along with the added costs required to support such processes. Thus, the safest solution is the simplest, generating an inborn root key at the hardware level through the use of a built-in PUF. There are many physical processes upon which a PUF can be built (over 40 to date), but one stands out above the rest, based on the mechanism known as Quantum Tunneling.
Anti-Fuse OTP
One-Time-Programmable Memory (OTP) is a type of non-volatile memory (NVM), and for most applications, it is the industry standard for single-use memory.
OTP replaces Read-only memory (ROM) in applications such as IDs, production records, encryption code, etc. It is also suitable for analog trimming, function selection, and parameter setting and has been used in a broad range of applications. Since the stored data can’t be changed after being programmed, it is a fundamental element in building a Hardware Root of Trust.
Hardware Root of Trust
Trust (RoT) underpins all Secure Operations on a chip and protects its critical assets. It provides a unique and unforgeable foundation from which a device builds its security architecture and authenticate each computing layer, from hardware to application.