NeoPUF
NeoPUF is a hardware security technology based on physically unclonable variations occurring in the silicon manufacturing process.
NeoPUF is a hardware security technology based on physically unclonable variations occurring in the silicon manufacturing process. The underlying benefit of using a PUF (Physical Unclonable Function) in cryptography is its “uniqueness” and “unpredictability”. With NeoPUF IP, users can generate truly random sequences for applications with high security requirements. Our innovative technology enables multi-layered security and resolves common PUF-related issues by eliminating the need for a costly and complicated ECC (Error Correction Code). The random number extracted by NeoPUF IP is unique and unclonable, a silicon “fingerprint” for a wide range of security purposes, including encryption, identification, authentication, security key generation, etc.
Inborn Secret
Inborn, unpredictable and ideal – true random entropy
Reliable & Robust
Stable CRPs (Challenge/Response Pairs) up to 175°C and no aging decay
Secure Storage
Combined NeoFuse OTP and NeoPUF RNS provides high security storage
Fast Time to Market
Many qualified platforms are ready for IoT security applications
True Root of Trust
Key management combined with secure storage opens many security application scenarios Ex: Supply Chain
Technical Principles
NeoPUF’s randomness is obtained from inhomogeneous oxide properties that naturally occur in the IC manufacturing process – an ideal entropy source. We can extract uniformly-distributed binary bits through our innovative technology based on amplification and self-feedback. The extracted random bits are activated upon enrollment, and thanks to a large entropy bit pool, users have the flexibility to choose their own key-generation approaches.
Use Cases & Functionality
Resources
Latest News
Technical Document
Webinar
- Enhancing Security in Embedded NVM Memory with PUF
- Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory
- PUFcc: The PUF-based Hardware Root-of-Trust for Secure Supply Chains
- PUFcc: A PUFrt-based Secure Co-processor
- Image Anti-Tampering Method Based on NeoPUF and Blockchain
- Security Applications Using True Hardware RoT: PUFrt
- PUFrt: A True PUF-based Hardware Root-of-Trust