White Papers

White Paper FPGA PUF

Securing FPGAs Beyond the Bitstream

While Intrinsic ID provides other PUF solutions for other FPGAs, this paper will focus on a new, “soft” PUF solution for the entire range of Xilinx FPGAs. This solution offers users a cryptographic technology to secure their own keys and to authenticate devices and communications between them on networks. In this paper, we will provide some brief background on security in SRAM-based FPGAs, examine some of the additional security needs for today’s FPGA applications, and detail the new Intrinsic ID soft PUF approach that provides FPGA security beyond the bitstream. We will describe a typical work-flow for the soft PUF approach, and provide some general application examples for the aerospace and defense industry.

This content is restricted! Please register to get access to this content.

SRAM PUF: The Secure Silicon Fingerprint

Low-cost and strong secret key-storage technology is critical to enable affordable and effective security systems. Silicon Physical Unclonable Functions (PUFs) have been seen for years as a promising and innovative security technology. Today, Static Random-Access Memory (SRAM)-based PUFs offer a mature and viable security component that is achieving widespread adoption in commercial products.

This paper shows that SRAM PUF is a mature technology for embedded authentication even in the most demanding environments.

This content is restricted! Please register to get access to this content.

The Reliability of SRAM PUF

Physical Unclonable Functions or PUFs are increasingly being deployed as a hardware root-of-trust to secure IoT devices, data and services. They often outcompete traditional non-volatile memories (e.g. flash, EEPROM, anti- fuses, etc.) on different performance metrics such as security, flexibility and cost.

In this white paper we explore the reliability and all its aspects for Intrinsic ID’s SRAM PUF system and show that it is a very reliable storage medium for a cryptographic key, even under extreme conditions and for the entire lifetime of the IC.

This content is restricted! Please register to get access to this content.
White Paper protecting IoT

Protecting the IoT with Invisible Keys

With the ever-growing number of devices connected to the Internet of Things (IoT), the need for strong security solutions for these devices continues to increase.

This white paper addresses the need for security by looking at the most fundamental assets of a connected device that need to be established: the keys and identities that are needed to protect data and authenticate devices to the network and each other. These assets are at the heart of any security architecture.

This content is restricted! Please register to get access to this content.

Flexible Key Provisioning with SRAM PUF

Securing billions of IoT devices requires a new key provisioning method that scales. Even the most innocuous IoT endpoints (such as webcams, DVR recorders and light bulbs) need protection, as demonstrated by the September 2016 Mirai cyber attack. The exploitation of these types of nodes led to a large scale disruption of Internet services.

In this white paper we propose an IoT key provisioning method based on SRAM Physical Unclonable Functions. This method removes the barriers to securing a broad range of IoT devices, even resource-limited endpoints, building the foundation for an Internet of Things we can trust.

This content is restricted! Please register to get access to this content.
Driving Economic Advantage with Strong IoT Security | white paper

Driving Economic Advantage with Strong IoT Security

It’s not about security … it’s about money. It always has been.

Can semiconductor companies develop secure solutions and at the same time contribute to their financial growth? Results of various studies suggest that addressing security would be a key for the semiconductor industry to unlock the full potential of the IoT, a tempting market that’s expected to rise to $1.2 trillion in 2022 according to IDC.

In this work we explain how SRAM PUF technology enables robust security designs that deliver an attractive ROI, de-risk threats in the supply chain, and even power new business models.

This content is restricted! Please register to get access to this content.