2020 Security on Chip Tech Forum
Learn from 3 Hot Topics in this Tech Forum
物理不可複製功能 – 從電路實現到安全應用
近年來隨著科技的發展以及逐漸受重視的安全需求，學界和產業界大量投入晶片指紋PUF (Physically Unclonable Functions)的研發。然而如何利用PUF優異的隨機特性輔助或搭配既有的安全功能，在產業界與學研兩界仍存有不小的落差。此一講題將依序介紹PUF的原理與運作、PUF具有的特性，以及數種不同PUF的電路實現，如早期的SRAM-PUF與近年問世的量子穿隧PUF。講題另將包含PUF的實際運用示例，並說明為何PUF在各應用場域都是不可或缺的重要安全基礎。
PUF-From Circuit Implementation to Security Applications
With the advancement of technology and increasing security requirements, chip fingerprint -- Physical Unclonable Function (PUF) has once again become a focus. This talk will introduce several kinds of PUF, such as the SRAM-PUF and the quantum tunneling PUF that has released in recent years. Through practical examples, PUF expert Dr. Kent will explain how PUF serves as an important security foundation in specific application fields.
Dr. Kent Chuang an engineer at PUFsecurity. He received his PhD in electrical engineering from KU Leuven University in Belgium in 2020 and joined the R&D department of PUFsecurity company in the same year. Prior to joining PUFsecurity, Dr. Zhuang worked as a researcher in the COSIC research group of KU Leuven and the imec research group in Belgium. His PhD research centers around developing highly reliable PUF circuits in CMOS and emerging memory technologies. Dr. Zhuang’s current research areas include hardware root of trust, PUF-based security solutions, and attack/protection technologies for password implementation.
Download Slide: PUF-From Circuit Implementation to Security Applications
Chip security requirements, functions and mechanism
In addition to algorithm as an important core in chip security, protecting the encryption and decryption keys depends on the secure key storage mechanism. It involves key generation, secure storage, and proper use of keys in algorithms. It also includes operations such as signature authentication required for secure connections, data transmission integrity, data encryption, and data non-repudiation. Our experienced FAE Aken Wang of PUFsecurity will provide an overview of the usage scenarios and mechanisms related to hardware chip security before diving deeper into the topic.
Aken Wang is an FAE at PUFsecurity. He has a background in electronic and electrical engineering, and his work in the security field mainly focuses on hardware chip security market analysis and security silicon intellectual property product specification research. On the application side, he is responsible for discussing security silicon intellectual property applications with end customers of various chip applications in IC design. Furthermore, his expertise lies in integrating hardware chip security and design with relevant specifications, trends, and applications of chip security requirements in different markets.
Download Slide: Chip security requirements, functions and mechanism
The composition, function, and security operation of the root-of-trust
When it comes to chip security, the global consensus is to establish a secure and effective root-of-trust. End users may suffer financial losses, personal information leakage, and even life safety threats due to insufficient security protection. Therefore, more and more products are required to have hardware security functions. Hence, enhancing the operation security of IoT applications by leveraging the chip root-of-trust is particularly important. Our Director of R&D MY Wu will provide an in depth analysis of secure chip root-of-trust from the fundamental hardware layer protection, and discuss how to achieve high security strength and complete security boundary (Security Boundary) with the support of anti-attack digital design.
Dr. Meng-Yi Wu is the director of R&D at PUFsecurity. His expertise lies in the technology development of embedded flash memory, OTP memory and physical unclonable functions (PUF) and its derivative security chip design. Prior to joining PUFsecurity, Dr. Wu spent ten years at eMemory. In 2018, his invention, NeoPUF, won the ISSCC Takuo Sugano Award. Dr. Wu currently leads the R&D department of Entropy Code Technology in focusing on the development of PUF-based hardware root of trust, chip security cooperator and other security function products.