Skip to content
PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

PUFsecurity | PUF-based Security IP Solutions | Secure the Connected World

  • Products
  • Technology
  • Resources
  • Company
    • Newsroom
    • About Us
    • Certifications and Awards
    • Markets
    • Careers
    • Contact
  • En

UID

2022 - 11 - 23

UID

With a UID, chips can generate an internal secret as a seed for key generation or a root key and an external plaintext number for chip identification or product series number. UID can also be used as the device’s identity by authentication and authorization algorithms to protect it from unauthorized access or cloning.

2022 - 11 - 23

HUK

A Hardware Unique Key (HUK) is the device-specific key acting as the “root” of all other secret keys on a particular device. It is crucial that the HUK remains secured to maintain the integrity of the Key chain it supports.

2022 - 01 - 05

Anti-tamper Design

Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.

2022 - 01 - 05

TRNG  

True Random Number Generators or TRNGs take this to the hardware level as a physical process. Typically, they generate random numbers from one or several entropy sources.

2022 - 01 - 05

Quantum Tunneling

As the first step in establishing any cybersecurity ecosystem, the process of key generation must remain reliably secure. Software-based key generation algorithms introduce various risk factors into the process, such as key management and key injection, along with the added costs required to support such processes. Thus, the safest solution is the simplest, generating an inborn root key at the hardware level through the use of a built-in PUF. There are many physical processes upon which a PUF can be built (over 40 to date), but one stands out above the rest, based on the mechanism known as Quantum Tunneling.

2022 - 01 - 04

Anti-Fuse OTP

One-Time-Programmable Memory (OTP) is a type of non-volatile memory (NVM), and for most applications, it is the industry standard for single-use memory.

OTP replaces Read-only memory (ROM) in applications such as IDs, production records, encryption code, etc. It is also suitable for analog trimming, function selection, and parameter setting and has been used in a broad range of applications. Since the stored data can’t be changed after being programmed, it is a fundamental element in building a Hardware Root of Trust.

Recent Posts

The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification

Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security

Hardware Security Book Series 2: PUF-based Solutions and Applications

Tackling the Challenges of Advanced Silicon Chips: an Innovative Approach to Safe and Reliable SRAM Repair

Hardware Security Book Series 1: Quantum Tunneling PUF

Tags

anti-tampering Arm Chiplet Crypto Coprocessor crypto currency cryptogaphy Flash Protection Hardware Security IoT OTP postquantumcryptography PQC PSA Certified PUF PUFcc PUFcc7 PUFrt RISC-V Architechure Root of Trust Secure OTP security SRAM Repair STB Supply Chain TLS White Paper Zero Trust

Subscribe to our Newsletter!

    Your address email

    • PUFrt
    • Secure OTP
    • PUFcc
    • Flash Protection
    • PUFhsm
    • Newsroom
    • About us
    • Markets
    • Careers
    • Contact
    • Terms of Use
    • Privacy Policy
    • YouTube
    • Facebook
    • LinkedIn
    • Twitter

    © 2019 - 2026 pufsecurity. All Rights Reserved.