{"id":1845,"date":"2021-12-20T14:42:15","date_gmt":"2021-12-20T14:42:15","guid":{"rendered":"https:\/\/blog.pufsecurity.com\/?p=1845"},"modified":"2023-11-27T02:45:54","modified_gmt":"2023-11-27T02:45:54","slug":"pufrt-solving-chip-securitys-weakest-link","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hans\/document\/pufrt-solving-chip-securitys-weakest-link\/","title":{"rendered":"PUFrt: Solving Chip Security\u2019s Weakest Link"},"content":{"rendered":"\n
<\/p>\n\n\n\n
Introduction<\/strong><\/p>\n\n\n\n In the 19th century, Netherland\u2019s cryptographer, Auguste Kerckhoff, created Kerckhoffs\u2019s principle<\/strong>, stating that \u201cA cryptosystem<\/a> should be secure even if everything about the system, except the key<\/a>, is public knowledge.\u201d The most crucial element in chip security is the Root Key or Hardware Unique Key (HUK). The key is the starting point not only for protecting each chip but also the chain of trust that encompasses the entire system and associated services. Therefore, key generation, along with its storage and usage, must be well considered from the beginning of the design.<\/p>\n\n\n\n With the invention of Physical Unclonable Functions (PUF), we can now create a unique, inborn, unclonable key at the hardware level. The natural follow-up question to this is, \u201cbut how do we protect this key?\u201d It is like storing your key to secrets in a drawer, a surefire way to break the secure boundary and create vulnerabilities. Security is only as strong as the weakest link, and in most cases, the weakest link is insecure key storage in eFuse. Insecure storage immediately compromises the whole system\u2019s security, regardless of the sophistication of the key itself.<\/p>\n\n\n\n Furthermore, we know users can update the software after production, but hardware cannot be. Therefore, it is very crucial to deploy appropriate hardware security at the beginning. PUFrt, an integration of PUF and anti-fuse-based secure One-Time Programmable (OTP) memory, provides proper hardware security at the manufacturing stage. It delivers an unclonable key and secure OTP storage with complete anti-tamper designs.<\/p>\n\n\n\n \u2193\u2193\u2193 5-minute video for a quick digest of this article (English voice-over + Chinese subtitles)\u2193\u2193\u2193<\/p>\n\n\n\n