skip to Main Content

Application Notes

Application notes offer practical insights into how to use the products of Intrinsic ID. The documents are intended for technical professionals using or planning to use Intrinsic ID products in a system or as part of a security solution.

Maria Lysenko MecxqK9DzBI Unsplash Edited2 300x169

This application note focuses on the use of QuiddiKey interrupt signals. It explains how to create a working implementation on a Xilinx Zynq XC7Z020 FPGA, which can serve as a blueprint for crafting a similar implementation on an ASIC. The benefit of using QuiddiKey interrupts is that time-critical tasks can be executed while QuiddiKey is running in parallel.

[Get application note]

XILINX ZYNQ 7020 Edited

This application note describes a basic but complete integration of Intrinsic ID QuiddiKey. It is geared towards engineering teams that are implementing QuiddiKey for the first time or planning to integrate QuiddiKey for the first time. It details a simple, realistic flow through the integration process using the QuiddiKey hardware and the QuiddiKey driver. The final result is a functional implementation of QuiddiKey on a Xilinx Zynq XC7Z020 FPGA.

[Get application note]

Shutterstock 386623786 Edited 16x9 300x169

Secure key storage is an essential requisite of internet-of-things (IoT) devices. In order to protect multiple keys for different applications, a key vault that provides strong protection is required. QuiddiKey, the Intrinsic ID SRAM PUF-based key-management hardware IP, provides a foundational building block for such a key vault. Leveraging the chip-unique characteristics of SRAM start-up values, keys are protected based on these silicon-specific properties that are extremely hard to reverse-engineer. This application note shows how to leverage QuiddiKey in a chip to provide a key vault for securely storing cryptographic keys from the application side.

[Get application note]

Pexels George Becker 114741 Edited 300x169

QuiddiKey, the Intrinsic ID SRAM PUF-based key-generation hardware IP, natively offers virtually unlimited key generation. By using the QuiddiKey optimized methods for multiple key generation, you will benefit from the QuiddiKey enhanced hardware security features, without the need for a standalone key generation component. This application note will highlight the details of this essential functionality of QuiddiKey and describes how to use it in a practical application.

[Get application note]

Back To Top