skip to Main Content

Application Notes

Application notes offer practical insights into how to use the products of Intrinsic ID. The documents are intended for technical professionals using or planning to use Intrinsic ID products in a system or as part of a security solution.

Hacker 16x9

This application note explains how to use QuiddiKey® as an integral part of a Secure Boot solution. By integrating the appropriate API calls during the first stages of boot, secure key storage can be added to the available boot flow. This then enables protection of confidential information such as application and user keys, as well as (part of) the actual boot code itself and application code. By using QuiddiKey, key material is no longer stored in the plain but is protected with physical unclonable function (PUF) technology, which greatly enhances security robustness against reverse engineering attacks.

[Get application note]

RoT Integration 16x9

This application note describes the integration of QuiddiKey® into OpenTitan, an opensource silicon root of trust. It is intended for engineering teams that plan to integrate QuiddiKey into OpenTitan as a peripheral.  The final result is a modification of the OpenTitan reference design that integrates QuiddiKey as a peripheral connected to the main bus where QuiddiKey can be accessed using its drivers.

[Get application note]

Maria Lysenko MecxqK9DzBI Unsplash Edited2

This application note focuses on the use of QuiddiKey interrupt signals. It explains how to create a working implementation on a Xilinx Zynq XC7Z020 FPGA, which can serve as a blueprint for crafting a similar implementation on an ASIC. The benefit of using QuiddiKey interrupts is that time-critical tasks can be executed while QuiddiKey is running in parallel.

[Get application note]

XILINX ZYNQ 7020 Edited

This application note describes a basic but complete integration of Intrinsic ID QuiddiKey. It is geared towards engineering teams that are implementing QuiddiKey for the first time or planning to integrate QuiddiKey for the first time. It details a simple, realistic flow through the integration process using the QuiddiKey hardware and the QuiddiKey driver. The final result is a functional implementation of QuiddiKey on a Xilinx Zynq XC7Z020 FPGA.

[Get application note]

Shutterstock 386623786 Edited 16x9

Secure key storage is an essential requisite of internet-of-things (IoT) devices. In order to protect multiple keys for different applications, a key vault that provides strong protection is required. QuiddiKey, the Intrinsic ID SRAM PUF-based key-management hardware IP, provides a foundational building block for such a key vault. Leveraging the chip-unique characteristics of SRAM start-up values, keys are protected based on these silicon-specific properties that are extremely hard to reverse-engineer. This application note shows how to leverage QuiddiKey in a chip to provide a key vault for securely storing cryptographic keys from the application side.

[Get application note]

Pexels George Becker 114741 Edited

QuiddiKey, the Intrinsic ID SRAM PUF-based key-generation hardware IP, natively offers virtually unlimited key generation. By using the QuiddiKey optimized methods for multiple key generation, you will benefit from the QuiddiKey enhanced hardware security features, without the need for a standalone key generation component. This application note will highlight the details of this essential functionality of QuiddiKey and describes how to use it in a practical application.

[Get application note]

Back To Top