Enabling Authentication with PUF-based Security

Synopsys is the world’s leading provider of security IP for embedded systems based on physical unclonable function (PUF) technology. The technology provides an additional level of hardware security by utilizing the inherent uniqueness of each and every silicon chip. The IP can be delivered in hardware or software and applied easily to almost any chip – from tiny microcontrollers to high-performance FPGAs – and at any stage of a product’s lifecycle. It is a hardware root of trust to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and aerospace data and systems. Synopsys PUF IP has been deployed and proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, ioXt, and governments across the globe. Our secure and robust PUF technology leverages a unique identifier (ID) intrinsically present in the silicon, seamlessly enabling the highest level of security in the most cost-effective way.

Identifiers extracted from a PUF cannot be cloned, guessed, stolen, or shared, and keys don’t remain stored on the system, providing the highest level of protection. Synopsys Hardware PUF IP integrates a PUF with crypto accelerators, securing MCUs for the IoT. Synopsys Software PUF IP makes the deployment and usability of hardware security easy. It works on all MCUs /CPUs, lowers the cost of a secure design, and improves time to market. Synopsys FPGA PUF IP binds sensitive data, such as FPGA bitstream, designs, IP, and encryption keys, to the hardware of the FPGA. 

Synopsys PUF IP usages include:

  • Cloud connectivity: easy device-to-cloud security that doesn't require additional hardware. It addresses the need for security for the IoT by lowering BOM cost and improving time to market.
  • Tracking: chip and device manufacturers can uniquely identify and track their components starting when they are a die on the wafer. Synopsys IP offers a robust and scalable tracking solution without storing an identity or key on the device. The solution is particularly suited for cost-sensitive chips and chips in advanced geometries.
  • Provisioning: mitigating risks and easing device provisioning, eliminating the need for centralized key management and programming.

Resources