{"id":1995,"date":"2020-06-02T15:07:00","date_gmt":"2020-06-02T15:07:00","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?p=1995"},"modified":"2022-06-14T00:41:10","modified_gmt":"2022-06-14T00:41:10","slug":"free-ip-evaluation-kit-program-bridging-the-gap-in-chip-security-2","status":"publish","type":"post","link":"https:\/\/www.pufsecurity.com\/zh-hans\/free-ip-evaluation-kit-program-bridging-the-gap-in-chip-security-2\/","title":{"rendered":"Free IP Evaluation Kit Program: Bridging the Gap in Chip Security"},"content":{"rendered":"\n
We live in a world where 5G, Artificial Intelligence, and the Internet of Things rapidly change our lifestyle. It is a smart and borderless global community. However, with the huge amount of personal information, cloud services, big data, and other network cloud-related applications, information leakage, tampering and other security issues are testing the security of these technologies. To protect IoT devices, hardware security solutions are the ideal solution since they are more reliable than software solutions. However, building a security design team is not only costly, but also time-consuming; as a result, the amount of time and capital required makes hardware security hard to adopt.<\/p>\n\n\n\n
<\/p>\n\n\n\n
PUFsecurity dedicated to the development of PUF-based hardware security IPs to meet the needs in different chip applications. By recognizing the difficulties chip manufacturers face while trying to secure chips, and the expectations of efficient integration, PUFsecurity takes the lead in launching the \u201cIP GO\u201d security opensource program. Researchers and chip designers who have security needs are welcome to download our\u202f \u201cevaluation pack\u201d for simulation and verification. To start, everyone can apply for free download of an “assessment” before heading onto PUFsecurity core IP “Applicable modules” and basic encryption algorithms that used for simulation and verification of preliminary design. “PUF-based Hardware Security Solutions provide very secure Root of Trust to secure customers\u2019 products. We hope to lower the initial threshold and cost for partners to adopt PUF security functions, and to achieve the goal of secure operation, secure computing, and secure storage,” said Charles Hsu, the president of PUFsecurity.<\/p>\n\n\n\n
<\/p>\n\n\n\n
Project Initial Stage: PUFrt Trial Module, a Hardware Root of Trust<\/strong><\/p>\n\n\n\n At the beginning of the IP GO project, PUFrt is the main IP with a high-security hardware root of trust (HRoT) that contains three main functions:<\/p>\n\n\n\n The\u00a0PUFrt\u00a0evaluation kit is composed of a digital part (PUFsecurity\u2019s\u00a0RTL design in encrypted Verilog format) and an analog part (eMemory\u2019s\u00a0OTP\/PUF behavioral model in Verilog format), user manual,\u00a0and simulation environment. With this evaluation kit, an\u00a0SoC designer can\u00a0apply and simulate the function of\u00a0PUFrt\u00a0in the pre-design stage,\u00a0allowing\u00a0designers\u00a0to evaluate whether\u00a0adding a hardware root of trust at the front-end design stage\u00a0is\u00a0suitable. The\u00a0PUFrt\u00a0design\u00a0also\u00a0includes a standard APB slave interface, making it easy to plug into existing systems that support the APB bus standard.\u00a0<\/p>\n\n\n\n <\/p>\n\n\n\n Join IP GO and be the first to try PUF-based IP <\/strong> <\/p>\n\n\n\n <\/p>\n\n\n\n