White Paper

Exploring technology matters of PUF-based security and solutions

Solving Chip Security’s Weakest Link 

Chip designers usually refer to crypto subsystem solutions such as the ARM Crypto Cell 312 (CC312) when it comes to chip security. The remained obstacle, however, is how to generate and safely store the root key for the system. The dual APB PUFrt is the exact missing piece for the puzzle. This solution not only completes secure boundary for IC but also maximizes the effectiveness of crypto subsystem for the entire SoC’s performance.

 

This whitepaper focuses on solving chip security’s weakest link by emphasizing on the most crucial element in chip security, the Root of Trust. This whitepaper also demonstrates the risks from eFuse Key Storage, what insecure storage vulnerabilities are, how anti-tampering enhances security, and how PUFrt can be the secure Root of Trust boundary for IC.  

_edited.jpg

PUFcc: An Essential Crypto Coprocessor for RISC-V.

PUFsecurity has developed the Crypto Coprocessor (PUFcc) for hassle-free integration into the RISC-V ecosystem. It is helping secure IoT applications by providing a foundational Hardware Root of Trust an extensive Secure Boundary. PUFcc’s hardware-accelerated security functions and access controls are now ready for Zero-Trust, Zero Touch security systems in Cloud applications.

This white paper starts by introducing the security designs needed for protecting the IoT applications, and brings out the design concept of PUFcc after discussing the insufficiencies of existing coprocessors.

_edited.jpg

Root of Trust: The Foundation of Security

Software security is no longer sufficient enough to protect IoT devices while facing fraud, tampering and other integrity and DoS attacks. As a result, computer hardware and firmware are perceived as more dependable and trustworthy than software.

A root of trust (RoT) is a set of functions that is always trusted by the computer’s OS such that it’s the trust foundation on which all secure operations of a computing system depend on. It contains the keys used for digital signature and verification cryptographic functions and enables a secure boot process.

The goal of this white paper is to provide a primary introduction to RoT. This paper also explains how to choose a right RoT as the trust anchor for a novel hardware based security architecture.

shutterstock_380217166.jpg