Vendor: PUFsecurity Category: Root Of Trust

Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine

The Flash Protection Series is a suite of enhancements available for PUFcc and PUFrt, extending the Hardware Root of Trust to pro…

Overview

The Flash Protection Series is a suite of enhancements available for PUFcc and PUFrt, extending the Hardware Root of Trust to protect critical assets in the commodity flash. The Flash Protection Series can widen an SoC’s secure boundary based on our highly reliable PUF technology widely available across all major foundries.

Key features

  • PUFef is designed to protect embedded Flash with a Hardware Root of Trust and a lite crypto engine of RC6.
  • The RC6 provides a comprehensive level of security while also minimizing overall size.
  • Before attempting to hack the crypto engine, attackers would first have to destroy the embedded Flash.

Block Diagram

What’s Included?

  • Datasheet
  • Release Notes
  • Integration Guidelines
  • Timing .lib File
  • LEF
  • GDS Phantom File
  • Verilog HDL File (Behavior Model)
  • Verilog HDL File (FPGA)
  • Application Note
  • Reference Scripts
  • Hard Macro Release Note
  • Test Methodology
  • Testbench

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
PUFef
Vendor
PUFsecurity

Provider

PUFsecurity
HQ: Taiwan
PUFsecurity is a subsidiary of eMemory and is dedicated to innovating PUF-based security solutions. By leveraging our technical acumen and achievements, including core IPs such as NeoPUF and OTP from eMemory, PUFsecurity brings PUF-based security to the market. The latest solutions include the integrated, five-in-one hardware root-of-trust module (PUFrt) and PUF-based crypto coprocessor (PUFcc). PUFsecurity offers hardware security IP solutions with superior performance and cost-efficiency in a wide range of process nodes with our proven industry expertise.

Learn more about Root Of Trust IP core

Root of Trust: A Security Essential for Cyber Defense

Imagine a datacenter powering critical cloud services, silently compromised by a tampered chip inserted during manufacturing. In most cases, the malware would be practically impossible to remove and could persist across formats/reinstalls !

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Root of Trust IP cores

What is Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine?

Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine is a Root Of Trust IP core from PUFsecurity listed on Semi IP Hub.

How should engineers evaluate this Root Of Trust?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Root Of Trust IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP