SRAM PUF Provides an Unclonable Security Mechanism

October 28, 2020 Rich Nass

Obviously your IoT devices need to be secure. Unfortunately, there are many ways to do that, so you need to pick the one (or ones) that best suit your needs. One of those methods is by using SRAM PUF, or physical unclonable function. Such a solution hails from Intrinsic-ID.

With PUF, your security is starting right at the semiconductor level. By leveraging the uniqueness that is intrinsic to every chip, you have the ability to protects the confidentiality and integrity of your data and your IoT system.

With this method, your cryptographic keys are derived from the PUF root key. This root key is never stored but recreated from the PUF when needed, providing a significantly higher security level.

Note this can be easily provisioned and implemented at low cost within the IoT device.

About the Author

Rich Nass

Richard Nass is the Executive Vice-President of OpenSystems Media. His key responsibilities include setting the direction for all aspects of OpenSystems Media’s Embedded and IoT product portfolios, including web sites, e-newsletters, print and digital magazines, and various other digital and print activities. He was instrumental in developing the company's on-line educational portal, Embedded University. Previously, Nass was the Brand Director for UBM’s award-winning Design News property. Prior to that, he led the content team for UBM Canon’s Medical Devices Group, as well all custom properties and events in the U.S., Europe, and Asia. Nass has been in the engineering OEM industry for more than 25 years. In prior stints, he led the Content Team at EE Times, handling the Embedded and Custom groups and the TechOnline DesignLine network of design engineering web sites. Nass holds a BSEE degree from the New Jersey Institute of Technology.

Follow on Twitter Follow on Linkedin Visit Website More Content by Rich Nass
Previous Article
The Invention of Apple’s Siri and Other Virtual Assistants
The Invention of Apple’s Siri and Other Virtual Assistants

Many of our electronic devices are now able to listen in on, or even participate in, human conversations. S...

Next Article
Making the Grade with Linux and Cybersecurity at the Intelligent Edge
Making the Grade with Linux and Cybersecurity at the Intelligent Edge

A Tech Video Series with Wind River’s Michael Mehlberg.