skip to Main Content

IoT Security - Zign 100

The number of connected devices, machines, sensors, or simply things are linked with each other over open communication networks on the internet of things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion – into the device itself, or the network to which it’s connected. These new security threats pose technology challenges in securing and stabilizing such large systems. In such an environment, secure device identity is an essential requirement for clone-resistant operational security.

The Intrinsic ID Zign® 100 API enables IoT developers to generate unique device identities, secure cryptographic keys, and random values. It enables easy and collision-free identification of billions of devices from different vendors. Zign 100 can also be integrated as a hardware-based trust anchor for Mbed TLS, OpenSSL, wolfSSL, and other libraries, extending the chain of trust beyond just a single device. Because it is a software-based solution, Zign is the only hardware entropy source currently available that doesn’t have to be loaded at silicon fabrication.

Features

  • Uses standard SRAM as a physical unclonable function (PUF) to create a device-unique identity and cryptographic keys
  • Keys are never stored, but re-created from the PUF each time they are needed
  • Keys are bound to the device and can only be recreated and accessed on the device on which they have been created
  • NIST SP 800-90A/B compliant random number generator

Benefits

  • Easy and collision-free identification of billions of devices from various vendors
  • A trust anchor can be installed later in the supply chain, or even remotely retrofitted on deployed devices
  • Offers stronger protection than traditional key storage in NVM
  • Seamlessly integrates with other crypto such as Mbed TLS, wolfSSL, and OpenSSL
  • Proven technology with 500M+ devices in the field
  • Zign 100 is post-quantum secure

Instruction Set Architecture (ISA) Support

Supported Instruction Set Architecture

Security Based on SRAM PUF

Zign 100

Zign 100 uses the inherently random start-up values of SRAM as a PUF from which a device-unique identity and root key is generated. The root key is never stored and is only available (in volatile memory) when needed. This means the key is never present in persistent memory – even when the chip is powered down – which raises the security significantly and eliminates the need for OTP or other secure memory.

A potentially unlimited number of keys can be derived from the root key by using the NIST-compliant key-derivation function. Zign 100 also offers random values, generated by a NIST 800-90A/B-compliant random number generator and a unique device identity for each device. All Zign features are accessed by the host software via the API.

Operating Ranges

SRAM PUF responses have been qualified for use with the Zign X00 series in a wide range of operational environments, over years of field operation:

  • All major fabs from 0.35 μm to 5 nm
  • Temperature range from -55°C to 150°C [-67°F to 300°F]
  • Voltage supply variation +/- 20%
  • Lifetime > 25 years

Deliverables

  • Target-specific library (C-code)
  • Datasheet
  • API reference manual
  • Code examples (e.g. of integration with Mbed TLS, OpenSSL, wolfSSL)
  • NIST documentation
  • Application notes

Zign 100 Configurations

Zign 100 is available in off-the-shelf configurations with size ranging between 6.3 kB and 7.6 kB. Configurations differ according to functionality, performance and compliance.

Specifications

Zign 100

Security strength (bits)

128 / 256

SRAM PUF (kB)

0.7 / 1.0

Code size (kB)

6.3 - 7.6

SRAM anti-aging

Device-unique identifier (UID)

Generate device-unique keys

Generate random values

NIST CAVP certifiable (DRBG, KDF, HMAC, SHA-2)

NIST SP 800-90A compliant DRBG

NIST SP 800-90B compliant entropy source for RNG (adds about 3 kB of SRAM)

(✓)

FIPS 140-3 ready

(✓)

Markets

  • Automotive
  • Chiplets
  • Financial services
  • Internet of things
  • Manufacturing
  • Medical
  • Memory
  • Sensors
  • Wearables
  • Microcontrollers

Applications

  • Anti-counterfeiting
  • Device-to-host Authentication
  • Secure key storage
  • Flexible key provisioning
  • HW-SW binding
  • Supply chain protection

Certifications

  • NIST CAVP
  • NIST SP 800-90A
  • Ready for NIST SP 800-90B
  • ISO/IEC 20897-compliant PUF
  • Ready for FIPS 140-3
Back To Top