UID
With a UID, chips can generate an internal secret as a seed for key generation or a root key and an external plaintext number for chip identification or product series number. UID can also be used as the device’s identity by authentication and authorization algorithms to protect it from unauthorized access or cloning.
HUK
A Hardware Unique Key (HUK) is the device-specific key acting as the “root” of all other secret keys on a particular device. It is crucial that the HUK remains secured to maintain the integrity of the Key chain it supports.
Anti-tamper Design
Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.
TRNG
True Random Number Generators or TRNGs take this to the hardware level as a physical process. Typically, they generate random numbers from one or several entropy sources.
Quantum Tunneling
As the first step in establishing any cybersecurity ecosystem, the process of key generation must remain reliably secure. Software-based key generation algorithms introduce various risk factors into the process, such as key management and key injection, along with the added costs required to support such processes. Thus, the safest solution is the simplest, generating an inborn root key at the hardware level through the use of a built-in PUF. There are many physical processes upon which a PUF can be built (over 40 to date), but one stands out above the rest, based on the mechanism known as Quantum Tunneling.
Anti-Fuse OTP
One-Time-Programmable Memory (OTP) is a type of non-volatile memory (NVM), and for most applications, it is the industry standard for single-use memory.
OTP replaces Read-only memory (ROM) in applications such as IDs, production records, encryption code, etc. It is also suitable for analog trimming, function selection, and parameter setting and has been used in a broad range of applications. Since the stored data can’t be changed after being programmed, it is a fundamental element in building a Hardware Root of Trust.