PUF Software Base
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…
Overview
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion - into the device itself or the network to which it’s connected.
Hardware-based security is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, hardware-based security shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The PUF - Software is an embedded solution that democratizes hardware security by uncoupling it from silicon fabrication, ensuring IoT application developers can access, understand, and implement it at scale.
The PUF - Software uses the inherently random power-up values of SRAM as a PUF from which a device-unique identity and root key are generated. The root key is never stored and is only available (in volatile memory) when needed. This means the key is never present in persistent memory - even when the chip is powered down - which raises the security significantly and makes the solution very effective against counterfeiting. All PUF - Software features are accessed by the host software via the API.
Key features
- Most flexible and scalable PUF-based security solution for new and existing designs
- Uses standard SRAM as a physical unclonable function (PUF) to create a hardware-based trust anchor which can be installed later in the supply chain, or even retrofitted on deployed devices
- Offers key provisioning, secure key storage, symmetric and asymmetric key cryptography, and data encryption on the fly
- Easy and collision-free identification of billions of devices (from various vendors)
- Contains a NIST SP 800-90A/B-compliant random number generator
- Keys are never stored but re-created from the PUF each time they are needed, offering stronger protection than traditional key storage in NVM
- No need for an additional security chip into the device - no Secure Element/TPM needed
- Seamlessly integrates with other crypto such as Mbed TLS, wolfSSL, and OpenSSL
Files
Note: some files may require an NDA depending on provider policy.
Specifications
Identity
Provider
Learn more about PUF IP core
ioPUF+: A PUF Based on I/O Pull-Up/Down Resistors for Secret Key Generation in IoT Nodes
Why SRAM PUF Technology Is the Bedrock of Dependable Security in Any Chip
Combining Root of Trust and PUF Technology For Robust Chip Security
Basics of SRAM PUF and how to deploy it for IoT security
The Four Angles of Examining PUF
Frequently asked questions about PUF IP cores
What is PUF Software Base?
PUF Software Base is a PUF IP core from Synopsys, Inc. listed on Semi IP Hub.
How should engineers evaluate this PUF?
Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this PUF IP.
Can this semiconductor IP be compared with similar products?
Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.