A comparison of SRAM vs quantum-derived semiconductor PUFs
By Leonardo Machado, Crypto Quantique
embedded.com (June 4, 2021)
This article explores the relative performance of SRAM PUF and quantum-derived semiconductor PUF technologies for IoT security.
There are now tens of billions of physical IoT devices connected over local networks and onward to the internet. Data from sensors transverses these networks. Actuators are actuated in response to the data. Simultaneously, applications analyze the data to facilitate a human or machine response.
But what if you don’t know which sensor is sending the data, or a response is initiated but sent to the wrong actuator? This is not just about a consumer’s smartphone exhibiting an irritating glitch. In industrial applications, it could be a production line shutting down, a hospital’s diagnostic equipment reporting the wrong information, or all the traffic lights at a road junction turning green at the same time. The potential for chaos is clear. To avoid such disasters, a fundamental requirement is to be able to identify, with absolute certainty, every IoT device on the network.
Almost without exception, a microcontroller (MCU) or other semiconductor integrated circuit (IC) is at the heart of each IoT device. It follows that if you can create a unique identity for each silicon chip, you have a unique identity for each IoT device. Such identities are sometimes described as device ‘fingerprints’ but they’re essentially just a series of random numbers. From an IoT security perspective, that’s not the whole story because if hackers attack the network, which is an increasingly common problem, they must not be able to steal device identities or duplicate them. If they can do so, it’s just a small step to being able to impersonate the devices on the network and even take control of the system to which they’re connected. That might be a car, a factory, or your home.
If, as we’re told by analysts, the IoT will soon embrace 50 billion devices, the challenge is to find a practical way of creating 10s of billions of unique, protectable, identities.
Today, most companies ‘inject’ the identities and keys into IoT devices, which means loading them with random numbers. It’s a process that’s relatively expensive – we estimate anywhere between 50 cents and 2 USD per device – and it sometimes means involving a third party in the IoT supply chain, which potentially adds risk. Two other risk factors need to be taken into account. First, the keys may not be as random as they should be. They may simply be derived from a computer’s clock chip. Second, injected keys need to be stored in a chip’s memory, making them vulnerable to leakage or theft.
Related Semiconductor IP
- PUF
- Quantum-Driven Hardware Root-of-Trust - Physical Unclonable Function (PUF)
- Fully Digital Physically Unclonable Function (PUF) - PQC Ready
- Fully-integrated 256-bit Physically Unclonable Function (PUF) with embedded reliability check
- Upgraded PUF-based Crypto Coprocessor (Compliant with TLS 1.3 / FIPS 186-5)
Related White Papers
- Three ways of looking at a sigma-delta ADC device
- USB 3.0 vs USB 2.0: A quick reference summary for the busy engineer
- A Brief History of Process Node Evolution
- Formal property verification: A tale of two methods
Latest White Papers
- New Realities Demand a New Approach to System Verification and Validation
- How silicon and circuit optimizations help FPGAs offer lower size, power and cost in video bridging applications
- Sustainable Hardware Specialization
- PCIe IP With Enhanced Security For The Automotive Market
- Top 5 Reasons why CPU is the Best Processor for AI Inference