skip to Main Content

White Papers

White papers enable exploration of technology matters related to device and IoT security, unclonable identities and authentication.

PQC Banner 16x9 1024x576

Discussions around the application of post-quantum cryptography are highly technical, which makes it challenging for security professionals to make well-informed decisions. Unfortunately, the current situation of temporary uncertainty also creates a brief opening for opportunistic actors to push their “solutions” through tactics of fearmongering and deception. This can lead to well-intentioned but misguided investments, and worst-case even to vulnerable systems. In this white paper we want to address some important questions with the goal of helping embedded security architects and engineers weather the current uncertain stage of this evolution by arming them with the right information.

[Direct access to PDF]

Secure Fingerprint 1024x576

Low-cost and strong secret key-storage technology is critical to enable affordable and effective security systems. Silicon Physical Unclonable Functions (PUFs) have been seen for years as a promising and innovative security technology. Today, Static Random-Access Memory (SRAM)-based PUFs offer a mature and viable security component that is achieving widespread adoption in commercial products.

This paper shows that SRAM PUF is a mature technology for embedded authentication even in the most demanding environments.

[Direct access to PDF]

GSA Cover 16x9

Security threats certainly have already deeply impacted the industry. Some companies have lost stock market value and struggled for months to deliver a solution to their customers and try to recover the damage caused to their brand image. Many of these incidents highlight that we are increasingly reliant on a few, dominant system building blocks, which have not been thoroughly security vetted yet. This paper describes common concepts and usage paradigms of security subsystems that are integrated into and are part of a larger microcontroller or system-on-chip (SoC) controller, which in turn is at the heart of an IoT device.

[Get white paper]

Drone Item Image Website

While Intrinsic ID provides other PUF solutions for other FPGAs, this paper will focus on a new, “soft” PUF solution for the entire range of Xilinx FPGAs. This solution offers users a cryptographic technology to secure their own keys and to authenticate devices and communications between them on networks. In this paper, we will provide some brief background on security in SRAM-based FPGAs, examine some of the additional security needs for today’s FPGA applications, and detail the new Intrinsic ID soft PUF approach that provides FPGA security beyond the bitstream. We will describe a typical work-flow for the soft PUF approach, and provide some general application examples for the aerospace and defense industry.

[Get white paper]

Vault Key Vault Based On SRAM PUF

Root of Trust technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure they communicate with.

In this white paper we explain how Root of Trust technology can be used to create a secure vault for keys and sensitive data. The solution presented in this paper is a first of its kind software SDK that can be deployed on virtually any IoT device to strengthen the security.

[Get white paper]

Reliability Image 1024x576

Physical Unclonable Functions or PUFs are increasingly being deployed as a hardware root-of-trust to secure IoT devices, data and services. They often outcompete traditional non-volatile memories (e.g. flash, EEPROM, anti- fuses, etc.) on different performance metrics such as security, flexibility and cost.

In this white paper we explore the reliability and all its aspects for Intrinsic ID’s SRAM PUF system and show that it is a very reliable storage medium for a cryptographic key, even under extreme conditions and for the entire lifetime of the IC.

[Get white paper]

Democratizing Picture 16x9 1

With a vast amount of devices getting connected to the internet of things (IoT) and the growing number of low-cost attacks being developed to hack such IoT devices, it is clear that the need for embedded security solutions is rising dramatically.

In this white paper we explain the basics of PUF technology and show how an embedded software solution is able to leverage this technology to add a strong, secure root key to almost any IoT device, without requiring changes in the SoC’s hardware.

[Get white paper]

Wp Driving Economic Advantage Resource Page Image

It’s not about security … it’s about money. It always has been.

Can semiconductor companies develop secure solutions and at the same time contribute to their financial growth? Results of various studies suggest that addressing security would be a key for the semiconductor industry to unlock the full potential of the IoT, a tempting market that’s expected to rise to $1.2 trillion in 2022 according to IDC.

In this work we explain how SRAM PUF technology enables robust security designs that deliver an attractive ROI, de-risk threats in the supply chain, and even power new business models.

[Get white paper]

Key Provisioning Image With Border 1024x576

Securing billions of IoT devices requires a new key provisioning method that scales. Even the most innocuous IoT endpoints (such as webcams, DVR recorders and light bulbs) need protection, as demonstrated by the September 2016 Mirai cyber attack. The exploitation of these types of nodes led to a large scale disruption of Internet services.

In this white paper we propose an IoT key provisioning method based on SRAM Physical Unclonable Functions. This method removes the barriers to securing a broad range of IoT devices, even resource-limited endpoints, building the foundation for an Internet of Things we can trust.

[Get white paper]

GSA IP Edited

The device industry is characterized by the fragmentation of the supply chains. The lack of consistent identity schemes for IoT devices is driving leading services providers to build walled gardens. When data generated by devices is not tagged by an identifier, its worthiness is degraded.

The objective of this document is to present the need for common schemes to identity devices, bind them dynamically to applications and manage them during their lifecycle. The document describes the importance of having trustworthy data and metadata from IoT devices to applications.

[Get white paper]

Back To Top