skip to Main Content

The Intrinsic ID Integrated Security Solutions

The Intrinsic ID products are based on Physical Unclonable Functions or PUF. Our secure and robust PUF technology leverages a unique ID intrinsically present in the silicon seamlessly enabling the highest level of security in the most cost-effective way.

Product Portfolio March 3 545px E1583278133473
Physical Unclonable Function QuiddiKey Hardware IP Zign Cloud Connectivity Apollo PUF as a Tracking ID Provisioning Zign RNG

Physical Unclonable Function

All our products are based on Physical Unclonable Functions or PUFs. Identifiers extracted from a PUF cannot be cloned, guessed, stolen or shared, and keys don’t remain stored on the system, providing the highest level of protection.

[Read more].

QuiddiKey Hardware IP

The world-leading IP that integrates a PUF with crypto accelerators. QuiddiKey has earned its stripes in the banking and government world and now gained a number one position securing MCUs for the IoT.

[Read more]

Zign

Embedded software that makes the deployment and usability of hardware-based security easy. It works on all MCUs /CPUs, lowers the cost of a secure design and improves time to market.

[Read more]

Cloud Connectivity

Easy device-device-to cloud security that doesn't require additional hardware. It addresses the need of security for the IoT by lowering BOM cost and improving time to market.

Apollo

A trust anchor on Xilinx FPGAs that binds sensitive data, such as FPGA bitstream, designs, IP and encryption keys to the hardware of the FPGA.

[Read more]

PUF as a Tracking ID

SRAM PUF enables chip and device manufacturers to uniquely identify and track their components starting when they are a die on the wafer. Intrinsic ID IP offers a robust and scalable tracking solution, without the need to store an identity or key on the device. The solution is particularly suited for cost- sensitive chips and chips in advanced geometries.

Provisioning

Use PUF technology to mitigate risks and ease device provisioning. Intrinsic ID IP eliminates the need for centralized key management and programming.

Zign RNG

Embedded software IP solution that enables device manufacturers and designers to add an RNG to their products without the need for hardware modifications.

[Read more]

Product QuiddiKey

Intrinsic ID QuiddiKey is a hardware IP solution that enables device manufacturers and designers to secure their products with internally generated, device-unique cryptographic keys without the need for adding costly, security-dedicated silicon. QuiddiKey uses the inherently random start-up values of SRAM as a physical unclonable function (PUF), which generates the entropy required for a strong hardware root of trust. QuiddiKey IP can be applied easily to almost any chip – from tiny microcontrollers (MCUs) to high-performance systems-on-chip (SoCs). SRAM is a standard component available upon initial release of any process technology; because it uses SRAM as a PUF source, Quiddikey IP can be used with any foundry and process-node technology. QuiddiKey has been deployed and proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, IoXt, and governments across the globe.

[Read more]

Apollo 364 204

FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable IP are abundant. Especially in aerospace and defense, attacks can result in loss of IP, leakage of top-secret information and compromised national security. A way for designers to secure their FPGAs, its sensitive data and communications, is the use of cryptography. Authenticity, integrity and confidentiality can be guaranteed by using strong cryptographic keys, rooted in the hardware of the FPGA.

Apollo combines a Butterfly Physical Unclonable Function (PUF) with Intrinsic ID’s helper data algorithms. Butterfly shaped circuits are configured on the fabric of the FPGA to intrinsically generate the entropy needed for a strong hardware root of trust. Keys derived from Apollo are volatile and derived only when required providing a significant high security assurance. Since Apollo is part of the FPGA configuration file it is a “soft PUF” implementation and security functionality can be retrofitted on deployed devices, enabling remote “brownfield” installation of a hardware root of trust.

[Read more]

Zign 16x9

The number of connected devices, machines, sensors, or simply things are linked with each other over open communication networks on the internet of things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion – into the device itself, or the network to which it’s connected.

Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, RoT technology shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The Intrinsic ID Zign® X00 embedded software solutions democratize RoT technology by uncoupling it from silicon fabrication, ensuring it can be accessed, understood, and implemented by IoT application developers at scale.

[Read more]

Zign RNG Product Image

Intrinsic ID Zign™ RNG is an embedded software IP solution that enables device manufacturers and designers to add a random number generator to their products without the need for hardware modifications. Random number generators are essential in many cryptographic operations, for example, to secure connections in settings such as IoT, automotive or datacenter. The Zign RNG product is compliant with the NIST SP 800-90 standard. It implements a deterministic random bit generator (DRBG) as specified in NIST SP 800-90A. The DRBG is seeded by a true random seed that is harvested from the noise in the SRAM physical unclonable function (PUF). This construction follows the NIST SP 800-90B specification.

[Read more]

PPC RT 2018.002.02 Dim.728x90 WP Invisible Keys

Back To Top