Vendor: Synopsys, Inc. Category: PUF

PUF Software Base

The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…

Overview

The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion - into the device itself or the network to which it’s connected.

Hardware-based security is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, hardware-based security shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The PUF - Software is an embedded solution that democratizes hardware security by uncoupling it from silicon fabrication, ensuring IoT application developers can access, understand, and implement it at scale.

The PUF - Software uses the inherently random power-up values of SRAM as a PUF from which a device-unique identity and root key are generated. The root key is never stored and is only available (in volatile memory) when needed. This means the key is never present in persistent memory - even when the chip is powered down - which raises the security significantly and makes the solution very effective against counterfeiting. All PUF - Software features are accessed by the host software via the API.

Key features

  • Most flexible and scalable PUF-based security solution for new and existing designs
  • Uses standard SRAM as a physical unclonable function (PUF) to create a hardware-based trust anchor which can be installed later in the supply chain, or even retrofitted on deployed devices
  • Offers key provisioning, secure key storage, symmetric and asymmetric key cryptography, and data encryption on the fly
  • Easy and collision-free identification of billions of devices (from various vendors)
  • Contains a NIST SP 800-90A/B-compliant random number generator
  • Keys are never stored but re-created from the PUF each time they are needed, offering stronger protection than traditional key storage in NVM
  • No need for an additional security chip into the device - no Secure Element/TPM needed
  • Seamlessly integrates with other crypto such as Mbed TLS, wolfSSL, and OpenSSL

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
dwc_puf_base_software
Vendor
Synopsys, Inc.

Provider

Synopsys, Inc.
HQ: USA
Synopsys is a leading provider of high-quality, silicon-proven semiconductor IP solutions for SoC designs. The broad Synopsys IP portfolio includes logic libraries, embedded memories, analog IP, wired and wireless interface IP, security IP, embedded processors and subsystems. To accelerate IP integration, software development, and silicon bring-up, Synopsys’ IP Accelerated initiative provides architecture design expertise, pre-verified and customizable IP subsystems, hardening, and signal/power integrity analysis. Synopsys' extensive investment in IP quality, comprehensive technical support and robust IP development methodology enables designers to reduce integration risk and accelerate time-to-market.

Learn more about PUF IP core

A Comprehensive Post-Quantum Cryptography (PQC) Solution based on Physical Unclonable Function (PUF)

This article provides an in-depth analysis of the specific PPA challenges introduced by PQC and elucidates how PUF-PQC leverages its unique dualtrack strategy to deliver a robust and flexible Hardware Root of Trust (HRoT) across diverse application scenarios. Furthermore, it demonstrates the integration of Physical Unclonable Function (PUF) with a NIST SP 800-90B compliant True Random Number Generator (TRNG) to serve as critical components of PUFrt (Root of Trust), ensuring the security of post-quantum key generation starting from the entropy source.

The Four Angles of Examining PUF

The security of AIoT devices has become increasingly important. In order to ensure that the system’s security functions are working effectively and protecting every node and edge device from information security risks, it is important to generate a unique root of trust in the security system rooted in the chip.

Frequently asked questions about PUF IP cores

What is PUF Software Base?

PUF Software Base is a PUF IP core from Synopsys, Inc. listed on Semi IP Hub.

How should engineers evaluate this PUF?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this PUF IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP