PUF-based Secure Crypto Coprocessor

Overview

PUFcc is a novel high-security Crypto Coprocessor. Compared to traditional security SoC design (embedded HSM with secure core or discrete crypto components), PUFcc can provide a much easier-to-adopt hardware RoT with less vulnerability. As a result, PUFcc quickly improves the security level for any system without additional loading on the processor core or operating system.

The security boundary for PUFcc is quite robust, based on physical separation of hardware, with less vulnerability than a software-only barrier. The on-board PUF is a naturally well-protected source of static entropy, suitable for SoC architects to build a system’s key hierarchy using established key generation and management procedures. In addition, PUFcc’s crypto engines can perform a wide variety of secure operations, such as key exchange, secure boot or TLS (public key validation and signing), authentication (MAC), or key wrapping (again based on the natural randomness inherent to the PUF) and store said wrapped keys to external memory.

Key Features

  • Crypto engine collective, consisting of private key cipher, message authentication code, hash, and key derivation functions that are NIST CAVP certified and OSCCA standards complied
  • Key wrapping function aiding the export of keys for external use
  • Public-key coprocessor, supporting all elliptic curve cryptography functions
  • Four 256-bits hardware PUF fingerprints with self-health check, that could be used as a unique identification (UID) or a root key(seed)
  • 8k-bits mass production OTP with built-in instant hardware encryption as standard off shelf
  • Customization in OTP size is available
  • Comprehensive anti-tamper designs in physical and RTL
  • High-quality true random number generator
  • APB control interface with secure/non-secure access privilege
  • AXI/AHB interface for direct memory access

Block Diagram

PUF-based Secure Crypto Coprocessor Block Diagram

Applications

  • Enhancing TEE security
  • Key processing and generation
  • Instant key wrapping or indirect key wrapping
  • Key hierarchy build and advanced management
  • Secure boot
  • Anti-cloning and asset protection by using local key encryption
  • TLS protocol

Deliverables

  • Datasheet
  • Release Notes
  • Integration Guidelines
  • Timing .lib file
  • LEF
  • Phantom GDS
  • Simulation Environment and PUF-based hard-macro behavior model
  • RTL: with Synthesis Script
  • Application note (memory-mapped register/FW/API)
  • FW/API Reference code
  • Hard Macro Release Note
  • Testing Methodology
  • Test Bench

Technical Specifications

Foundry, Node
200+ process nodes in 25+ foundries
×
Semiconductor IP