Take a fresh look at your lifestyle.

How embedded systems are safe by Physically Unclonable Function Technology

Abstract

Hardware-based security provides robust protection against cyberattacks, and physically unclonable function (PUF) technology can further enhance that much cla of protection when used by chips that implement cryptographic functionality. This application note discusses a brand new PUF semiconductor solution that employs the random analog characteristics of MOSFET transistors, the essential foundation of CMOS ICs. In the chip level, the PUF solution is constructed from a range of analog circuit elements, featuring inherent randomness in I-V characteristics and sized based on the number of bits necessary to attain the cryptographic requirements of the chip. When needed, the PUF is operated to derive a per-chip random, unique, and repeatable binary value that's only accessible by chip crypto blocks. Once it is no longer needed, the PUF-derived key value is instantaneously erased and doesn't appear in digital form. This PUF solution has demonstrated high reliability and appropriate crypto quality -both criteria that enable a PUF output for use as a cryptographic key value.

Introduction

Cryptography provides flexible and efficient tools to counter an array of potential security threats that embedded electronic systems face. There are a number of hardware and software processes for implementing crypto solutions. It is generally understood that the hardware-based solution (i.e., a dedicated security IC) is easily the most effective formulation for that root of trust and the way to provide the countermeasures and protection that prevent numerous kinds of common attacks.

Valuable assets associated with embedded systems face relentless threats. For example, such systems encounter intrusions for example theft of ip, introduction of malware to disrupt or destroy equipment, unauthorized access to sensitive communication, and tampering with data created from IoT endpoints. Security ICs and also the cryptographic solutions available can address these threats. However, the safety ICs themselves can become the target of attack by an adversary attempting to circumvent or break the safety.

Attacks on Security ICs

Assuming a burglar IC-based protection solution, there's two general types of attack scenarios: non-invasive