skip to Main Content

IoT Security - Zign 300

Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, RoT technology shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The Intrinsic ID Zign® 300 embedded software solution democratizes RoT technology by uncoupling it from silicon fabrication, ensuring it can be accessed, understood, and implemented by IoT application developers at scale.

Zign 300 is a secure key generation and management solution for any IoT device. As a software-based solution, Zign is the only hardware entropy source currently available that doesn’t have to be loaded at silicon fabrication. It streamlines IoT OEM and ODM security efforts by creating unique, internally generated device keys and identities derived from the inherent randomness of SRAM PUFs.

The Zign 300 API enables IoT developers to generate cryptographic keys securely and to perform other symmetric key and elliptic curve cryptographic functions. It can also be integrated as a trust anchor for Mbed TLS, OpenSSL, wolfSSL, and other libraries, extending the chain of trust beyond just a single device.


  • Secure key generation and management
  • Uses standard SRAM as a PUF to create an unclonable identity for any device
  • Offers key provisioning, secure key storage, symmetric key and elliptic curve cryptography
  • Root keys are never stored, but re-created from the PUF each time they are needed
  • Keys are bound to the device and can only be recreated and accessed on the device on which they have been created


  • A trust anchor that can be installed later in the supply chain, or even remotely retrofitted on deployed devices
  • No need for additional or modified silicon
  • Works on all MCUs, CPUs, offering the best combination of security, flexibility and cost
  • Offers stronger authentication and higher security than traditional key storage in NVM
  • Seamlessly integrates with other crypto such as Mbed TLS, wolfSSL, and OpenSSL
  • Intrinsic ID PUFs are post-quantum secure

Instruction Set Architecture (ISA) Support

Supported Instruction Set Architecture

Zign 300Unclonable Identities for the IoT

To solve security problems in IoT systems, such as authentication, product lifecycle management, reverse engineering and cloning, every device needs an unclonable identity. This consists of a secret key, a public key and a certificate. The biggest challenge is to get these credentials into the device and keep the secret key secret. This can be achieved by using Zign 300. Zign 300 offers the strongest protection of the device secret key and the strongest authentication via unclonable identities.

Security Based on SRAM PUF

By using SRAM PUF technology, keys are regenerated when needed, and never present in persistent memory – not even when the chip is powered down – which raises the security significantly and eliminates the need for OTP or secure memory.

Zign 300 offers random values, generated by a NIST 800-90A/B-compliant random number generator, and a collision-free unique device identity (UID). It also offers functions to wrap and manage secret keys and data which then can be stored in unprotected memory or can be securely transmitted over the network. In addition, Zign 300 offers public key crypto functions such as ECDSA sign and verify, and ECDH shared secret. PKI elements such as certificate signing requests (CSR) are optional. All Zign features are accessed by the host software via the API.

Operating Ranges

SRAM PUF responses have been qualified for use with the Zign X00 series in a wide range of operational environments,  over years of field operation:

  • All major fabs from 0.35 μm to 5 nm
  • Temperature range from -55°C to 150°C [-67°F to 300°F]
  • Voltage supply variation +/- 20%
  • Lifetime > 25 years


  • Target-specific library (C-code)
  • Datasheet
  • API reference manual
  • Code examples (e.g. of integration with Mbed TLS, OpenSSL, wolfSSL)
  • NIST documentation
  • Application notes

Zign 300 Configurations

Zign 300 is available in off-the-shelf configurations with size ranging between 16 kB and 29 kB. Configurations differ according to functionality, performance and compliance.


Zign 300

Security strength (bits)

128 / 256


0.7 / 1.0

Code size (kB)

16 - 29

SRAM anti-aging

Generate device-unique keys

Generate UID and random values

Wrap and unwrap application keys

Streaming AES, Hash, MAC

Public key crypto functions*

PKI elements**


NIST CAVP certification (DRBG, AES, KDF, HMAC, SHA-2, ECC)

NIST SP 800-90A compliant DRBG

NIST SP 800-90B compliant entropy source for RNG (adds about 3kB of SRAM)


FIPS 140-3 ready


* Includes ECDSA sign and verify, ECDH shared secret, standard elliptic-curve support set: P256, P384, P521
** Elliptic curve integrated encryption scheme (ECIES), certificate signing request (CSR), self-signed certificates (SSC)


  • Automotive
  • Chiplets
  • Financial services
  • Internet of things
  • Manufacturing
  • Medical
  • Memory
  • Sensors
  • Wearables
  • Microcontrollers


  • Anti-counterfeiting
  • Device-to-host Authentication
  • Secure key storage
  • Flexible key provisioning
  • HW-SW binding
  • Supply chain protection


  • NIST SP 800-90A
  • ISO/IEC 20897-compliant PUF
  • Ready for NIST SP 800-90B
  • Ready for FIPS 140-3
Back To Top