Intrinsic ID’s Integrated Security Solutions
Intrinsic ID’s products are based on Physical Unclonable Functions or PUF. Our secure and robust PUF technology leverages a unique ID intrinsically present in the silicon seamlessly enabling the highest level of security in the most cost-effective way.
Physical Unclonable Function
All our products are based on Physical Unclonable Functions or PUFs. Identifiers extracted from a PUF cannot be cloned, guessed, stolen or shared, and keys don’t remain stored on the system, providing the highest level of protection.
QuiddiKey Hardware IP
The world-leading IP that integrates a PUF with crypto accelerators. QuiddiKey has earned its stripes in the banking and government world and now gained a number one position securing MCUs for the IoT.
Embedded software that makes the deployment and usability of hardware-based security easy. It works on all MCUs /CPUs, lowers the cost of a secure design and improves time to market.
Easy device-device-to cloud security that doesn't require additional hardware. It addresses the need of security for the IoT by lowering BOM cost and improving time to market.
A trust anchor on Xilinx FPGAs that binds sensitive data, such as FPGA bitstream, designs, IP and encryption keys to the hardware of the FPGA.
PUF as a Tracking ID
SRAM PUF allows for tracking components as early as from a die on the wafer. No need to store an identity or key on the device to get a robust, scalable and highly efficient tracking solution. Suitable for low-end devices that have no memory available on chip to program a unique ID, or when programming in the hardware is economically not feasible.
Citadel Infrastructure Tools
This suite of products enable easy setup, management and use of SRAM PUF-based unclonable device identities for securing IoT applications.They accelerate the deployment and improve time to market of any IoT design
Intrinsic ID QuiddiKey is a hardware IP solution that enables device manufacturers and designers to secure their products with internally generated, device-unique cryptographic keys without the need for adding costly, security-dedicated silicon. QuiddiKey uses the inherently random start-up values of SRAM as a physical unclonable function (PUF), which generates the entropy required for a strong hardware root of trust. QuiddiKey IP can be applied easily to almost any chip – from tiny microcontrollers (MCUs) to high-performance systems-on-chip (SoCs). SRAM is a standard component available upon initial release of any process technology; because it uses SRAM as a PUF source, Quiddikey IP can be used with any foundry and process-node technology. QuiddiKey has been deployed and proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, IoXt, and governments across the globe.
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable IP are abundant. Especially in aerospace and defense, attacks can result in loss of IP, leakage of top-secret information and compromised national security. A way for designers to secure their FPGAs, its sensitive data and communications, is the use of cryptography. Authenticity, integrity and confidentiality can be guaranteed by using strong cryptographic keys, rooted in the hardware of the FPGA.
Apollo combines a Butterfly Physical Unclonable Function (PUF) with Intrinsic ID’s helper data algorithms. Butterfly shaped circuits are configured on the fabric of the FPGA to intrinsically generate the entropy needed for a strong hardware root of trust. Keys derived from Apollo are volatile and derived only when required providing a significant high security assurance. Since Apollo is part of the FPGA configuration file it is a “soft PUF” implementation and security functionality can be retrofitted on deployed devices, enabling remote “brownfield” installation of a hardware root of trust.
The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication.
Citadel Infrastructure Tools is a suite of software products which accelerate SRAM PUF deployment of unclonable device identities for securing IoT applications, particularly those targeting wide-scale deployment. They can be used by semiconductor vendors and OEMs to provision their devices, and by OEMs and application developers to create applications that are using SRAM PUF-based security. Available are tools for provisioning and for crypto applications which, along with BK™ and QuiddiKey® key-management products, form the basis of secure device lifecycle management.