The Intrinsic ID Integrated Security Solutions
Intrinsic ID’s products are based on Physical Unclonable Functions or PUF. Our secure and robust PUF technology leverages a unique ID intrinsically present in the silicon seamlessly enabling the highest level of security in the most cost-effective way.

Physical Unclonable Function
All our products are based on Physical Unclonable Functions or PUFs. Identifiers extracted from a PUF cannot be cloned, guessed, stolen or shared, and keys don’t remain stored on the system, providing the highest level of protection.
QuiddiKey Hardware IP
The world-leading IP that integrates a PUF with crypto accelerators. QuiddiKey has earned its stripes in the banking and government world and now gained a number one position securing MCUs for the IoT.
Zign
Embedded software that makes the deployment and usability of hardware-based security easy. It works on all MCUs /CPUs, lowers the cost of a secure design and improves time to market.
Cloud Connectivity
Easy device-device-to cloud security that doesn't require additional hardware. It addresses the need of security for the IoT by lowering BOM cost and improving time to market.
Apollo
A trust anchor on Xilinx FPGAs that binds sensitive data, such as FPGA bitstream, designs, IP and encryption keys to the hardware of the FPGA.
PUF as a Tracking ID
SRAM PUF allows for tracking components as early as from a die on the wafer. No need to store an identity or key on the device to get a robust, scalable and highly efficient tracking solution. Suitable for low-end devices that have no memory available on chip to program a unique ID, or when programming in the hardware is economically not feasible.
Citadel Infrastructure Tools
This suite of products enable easy setup, management and use of SRAM PUF-based unclonable device identities for securing IoT applications.They accelerate the deployment and improve time to market of any IoT design
Zign RNG
Embedded software IP solution that enables device manufacturers and designers to add an RNG to their products without the need for hardware modifications.
Intrinsic ID QuiddiKey is a hardware IP solution that enables device manufacturers and designers to secure their products with internally generated, device-unique cryptographic keys without the need for adding costly, security-dedicated silicon. QuiddiKey uses the inherently random start-up values of SRAM as a physical unclonable function (PUF), which generates the entropy required for a strong hardware root of trust. QuiddiKey IP can be applied easily to almost any chip – from tiny microcontrollers (MCUs) to high-performance systems-on-chip (SoCs). SRAM is a standard component available upon initial release of any process technology; because it uses SRAM as a PUF source, Quiddikey IP can be used with any foundry and process-node technology. QuiddiKey has been deployed and proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, IoXt, and governments across the globe.
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable IP are abundant. Especially in aerospace and defense, attacks can result in loss of IP, leakage of top-secret information and compromised national security. A way for designers to secure their FPGAs, its sensitive data and communications, is the use of cryptography. Authenticity, integrity and confidentiality can be guaranteed by using strong cryptographic keys, rooted in the hardware of the FPGA.
Apollo combines a Butterfly Physical Unclonable Function (PUF) with Intrinsic ID’s helper data algorithms. Butterfly shaped circuits are configured on the fabric of the FPGA to intrinsically generate the entropy needed for a strong hardware root of trust. Keys derived from Apollo are volatile and derived only when required providing a significant high security assurance. Since Apollo is part of the FPGA configuration file it is a “soft PUF” implementation and security functionality can be retrofitted on deployed devices, enabling remote “brownfield” installation of a hardware root of trust.
The number of connected devices, machines, sensors, or simply things are linked with each other over open communication networks on the internet of things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion – into the device itself, or the network to which it’s connected.
Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, RoT technology shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The Intrinsic ID Zign® X00 embedded software solutions democratize RoT technology by uncoupling it from silicon fabrication, ensuring it can be accessed, understood, and implemented by IoT application developers at scale.
Intrinsic ID Zign™ RNG is an embedded software IP solution that enables device manufacturers and designers to add a random number generator to their products without the need for hardware modifications. Random number generators are essential in many cryptographic operations, for example, to secure connections in settings such as IoT, automotive or datacenter. The Zign RNG product is compliant with the NIST SP 800-90 standard. It implements a deterministic random bit generator (DRBG) as specified in NIST SP 800-90A. The DRBG is seeded by a true random seed that is harvested from the noise in the SRAM physical unclonable function (PUF). This construction follows the NIST SP 800-90B specification.
Citadel Infrastructure Tools is a suite of software products which accelerate SRAM PUF deployment of unclonable device identities for securing IoT applications, particularly those targeting wide-scale deployment. They can be used by semiconductor vendors and OEMs to provision their devices, and by OEMs and application developers to create applications that are using SRAM PUF-based security. Available are tools for provisioning and for crypto applications which, along with BK™ and QuiddiKey® key-management products, form the basis of secure device lifecycle management.