The Competitive Advantage of SRAM PUF Technology

Geert-Jan Schrijen, Vincent van der Leest

Jul 16, 2025 / 5 min read

Synopsys IP
Technical Bulletin

In-depth technical articles, white papers, videos, webinars, product announcements and more.

In the article from 2024, "SRAM PUF: The Secure Silicon Fingerprint", we explored the fundamentals of SRAM-based Physical Unclonable Functions (PUFs) and their role as a secure, cost-effective, and scalable solution for cryptographic (root) key generation and storage. SRAM PUF technology leverages the unique physical properties of silicon to create device-specific identifiers, offering a robust alternative to traditional key storage methods. If you're unfamiliar with the basics of SRAM PUF, we encourage you to read the earlier article for a detailed introduction.

In this follow-up, we will compare SRAM PUF to other PUF technologies, specifically OTP-based PUFs and Delay-based PUFs, to highlight its unique advantages. We will also discuss the future of SRAM PUF based on an emerging application.

Figure 1: Extracting a strong secret key from SRAM behavior

Comparing SRAM PUF to Other PUF Types

PUFs are a cornerstone of modern cryptographic systems, offering secure key generation and device authentication. However, not all PUF technologies are created equal. Below, we compare the Synopsys implementation of SRAM PUFs to OTP-based PUFs and Delay-based PUFs across key attributes such as security, portability, reliability, and silicon-proven performance.

The comparison in this article is based on the recently published white paper “SRAM PUF: A Revolutionary Approach to Cryptographic Key Protection”. Download this white paper now for further details and a deeper analysis.

1. Security

  • SRAM PUF: SRAM PUFs dynamically reconstruct cryptographic keys, such as root keys, from the unique power-up states of SRAM cells, ensuring that no keys are stored on the chip. This makes them highly resistant to invasive attacks. Built-in countermeasures, such as randomization and masking during key reconstruction, further enhance security against side-channel attacks.
  • OTP-Based PUFs: OTP-based PUFs involve state changes in the silicon to program keys, making them vulnerable to physical attacks such as reverse engineering and voltage contrast methods. Once compromised, the stored keys cannot be replaced or regenerated.
  • Delay-Based PUFs: Delay-based PUFs, such as Loop PUFs, rely on oscillating frequencies, which are susceptible to side-channel attacks. Delay-based PUFs with multiple challenge-response pairs are vulnerable to modeling attacks. These vulnerabilities can compromise the security of the generated keys.

2. Portability

  • SRAM PUF: SRAM PUFs are technology-node agnostic, meaning they work seamlessly across different silicon manufacturing processes without requiring tuning. This makes them highly portable and scalable for diverse applications.
  • OTP-Based PUFs: OTP-based PUFs are process-dependent, limiting their portability and scalability.
  • Delay-Based PUFs: Delay-based PUFs offer better portability than OTP-based PUFs but still require tuning for each process node, adding complexity to their integration.

3. Entropy

  • SRAM PUF: SRAM PUFs actively debias their responses to ensure full entropy, producing high-quality cryptographic keys that meet stringent cryptographic requirements. This approach has been validated in peer-reviewed studies.
  • OTP-Based PUFs: OTP-based PUFs assume perfect entropy that does not require processing, which may not hold in real-world conditions due to manufacturing variations and environmental changes. Without active debiasing, their keys could have a shortage of entropy.
  • Delay-Based PUFs: The entropy of Delay-based PUFs is highly implementation-dependent, relying on specific algorithms and mechanisms to ensure randomness.

4. Reliability

  • SRAM PUF: SRAM PUFs employ unique and robust error correction codes (ECC), which have been extensively peer reviewed, to ensure consistent key reconstruction, even under adverse conditions such as temperature fluctuations, voltage variations, and aging effects. This makes them highly reliable for long-term use.
  • OTP-Based PUFs: OTP-based PUFs typically lack ECC mechanisms, meaning that even a single bit flip caused by noise or aging can compromise security. While they claim zero error rates, real-world conditions can lead to unexpected failures.
  • Delay-Based PUFs: There are Delay-based PUFs on the market that also claim to have no need for ECC implementation, while others state they do have ECC. This makes their reliability highly dependent on the specific implementation.

5. Silicon-Proven Performance

  • SRAM PUF: Synopsys SRAM PUFs have been extensively deployed in real-world applications for over a decade, with more than1 billion devices in production, while deployment is growing fast. This track record demonstrates their maturity and proven effectiveness.
  • OTP-Based PUFs: OTP-based PUFs have seen limited commercial deployment, and very few proof points in peer-reviewed literature about deployed OTP-based PUFs.
  • Delay-Based PUFs: Delay-based PUFs have very limited adoption, with few implementations beyond academia.

6. Ease of Integration

  • SRAM PUF: SRAM PUFs use standard digital components, making them easy to integrate into existing systems without requiring additional controllers or process-specific tuning. This simplicity reduces total cost of ownership (TCO) and accelerates development timelines.
  • OTP-Based PUFs: OTP-based PUFs require non-standard components. This complicates integration, increases manufacturing costs, and limits foundry options.
  • Delay-Based PUFs: Delay-based PUFs demand tuning for each process node, complicating integration and extending development timelines.


Securing Silicon From the Start – Modular IP Solutions for Long-Term Resilience

Discover actionable insights and strategies for building trusted, compliant, and resilient chips that stand up to emerging risks.


New: The Most Secure Storage Solution – Integrating SRAM PUF and OTP

Synopsys has developed an innovative solution, which will soon be released, that combines OTP memory with SRAM PUF to address the growing need for secure data storage in embedded systems. This cutting-edge approach leverages the unique properties of SRAM PUF to generate and recreate cryptographic keys, which are then used to encrypt all data stored in OTP memory.

By ensuring that only encrypted data resides in OTP, Synopsys’ solution provides a robust defense against invasive attacks, such as the attack demonstrated by IOActive in 2025 on a Raspberry Pi. This attack showed that storing sensitive data in plaintext OTP memory leaves it vulnerable to physical attacks such as decapsulation and passive voltage contrast scanning. Solutions based on RTL keys, which are hardcoded into the design, are also inadequate to protect the data. These keys can be extracted through reverse engineering attacks using multiple samples (leveraging the fact that RTL keys are not unique per chip). By encrypting all data stored in OTP and keeping the cryptographic key separate (and dynamically generated) using the SRAM PUF, the risk of data compromise through invasive attacks is effectively mitigated.

By combining the strengths of SRAM PUF and OTP into a single product, Synopsys has developed a forward-looking solution that addresses the vulnerabilities exposed by recent invasive attacks and sets a new standard for hardware security. This product delivers a significant leap forward in protecting sensitive data in embedded systems.

Conclusion

SRAM PUF has emerged as a transformative technology for secure (root) key generation and storage, offering superior security, reliability, and scalability compared to other PUF types. Its ability to dynamically reconstruct keys without storing them on-chip, combined with robust error correction mechanisms, makes it a trusted solution across industries, from IoT and automotive to data centers, aerospace, and government applications.

As security challenges evolve, SRAM PUF continues to adapt. An example of this is the innovative Secure Storage approach, where SRAM PUF is combined with OTP memory. Its encrypted data storage protects against invasive attacks, providing robust defenses against physical tampering. SRAM PUF’s proven track record and ongoing innovation ensure that it remains a foundational component of secure digital systems, ready to meet the demands of the future.

Subscribe to the Synopsys IP Technical Bulletin

Includes in-depth technical articles, white papers, videos, upcoming webinars, product announcements and more.

Related Resources


Continue Reading