skip to Main Content

Edge-to-Cloud Security

Problem: Lack of Robust Hardware Keys to Anchor Trust

IoT platforms from cloud service providers (CSPs) such as Amazon AWS, Microsoft Azure, Google Cloud, and Alibaba Cloud offer services to onboard new edge IoT devices to their cloud. But strong device-unique keys, forming a robust root of trust, are not part of the service.

And adding an external security chip, such as a secure element, for this purpose is an expensive solution.

Solution: SRAM PUF-based Unclonable Identity

Keys from the Inside

  • SRAM PUF technology uses the uniqueness that’s inherent to every chip to create device-unique keys from the inside
  • Device unique keys are never stored on device to increase security strength
  • This “Silicon Fingerprint” forms the basis for a strong hardware root-of-trust

Edge-to-Cloud IoT Security

SRAM PUF Technology combined with Public Key Cryptography for the IoT

  • BroadKey-Pro combines SRAM PUF technology with lightweight elliptic curve cryptography in order to create a device-unique private-public key pairs
  • These key pairs form the basis of device-unique unclonable identities (= key pair + device certificate) which are necessary to authenticate devices to the cloud and secure their communications
  • The technology has been optimized to run on resource-constrained IoT devices
Back To Top