With a vast amount of devices getting connected to the internet of things (IoT) and the growing number of low-cost attacks being developed to hack such IoT devices, it is clear that the need for embedded security solutions is rising dramatically.
A security subsystem in the main system-on-chip (SoC) of a device can be deployed to offer secure cryptographic services to the applications running on the device. But these services can only be secure if the cryptographic keys used by the system are protected properly against attackers. In practice, this is quite a challenge. Existing key storage methods offer limited security against invasive attacks, are inflexible and can add significantly to costs. A universal solution for solving this key storage problem is offered by SRAM physical unclonable function (PUF) technology.
In this white paper we explain the basics of this technology and show how an embedded software solution is able to leverage PUF technology to add a strong, secure root key to almost any IoT device, without requiring changes in the SoC’s hardware.
- Is Everything Connected? Then Everything’s at Risk!
- Limiting the IoT Attack Surface
- Two Perspectives on IoT Security
- Key Generation and Secure Storage
- Comparing the Different Methodologies
Please complete this form and we will send you our white paper Democratizing Roots of Trust from Silicon to Software. Fields with an asterisk (*) are required.