Cloud native EDA tools & pre-optimized hardware platforms
The number of connected devices, machines, or sensors linked with each other over open communication networks on the internet of things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion – into the device itself or the network to which it’s connected. These new security threats pose technology challenges in securing and stabilizing such large systems. In such an environment, root-of-trust (RoT) technology is essential for every connected device.
Synopsys Hardware-based PUF IP - 100 is a physical unclonable function or PUF-based RoT solution that can be applied easily to almost any chip – even the tiniest microcontrollers – without needing costly, security-dedicated silicon. Synopsys Hardware-based PUF IP - 100 can also be integrated as a trust anchor for other crypto libraries, extending the chain of trust beyond just a single device. Synopsys Hardware-based IP has been deployed and proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, ioXt, and governments across the globe.
Secure supply chain: Each Synopsys Hardware-based PUF IP user can generate unlimited device-unique keys. None of these keys are ever stored on the device. This means that each user in the supply chain can derive their own device-unique keys and import and protect other secrets without these keys or secrets being known to the manufacturer or other supply-chain users. The wrapping functionality enables supply-chain applications and IP to be securely and reliably protected – for the device's lifetime – before being deployed in the field.
Protection against reverse-engineering, counterfeiting/cloning: Synopsys Hardware-based PUF IP protects firmware IP by encrypting it with a PUF-derived encryption key that is locked to the hardware instance of the device. If the firmware IP tied to a device with Synopsys Hardware-based PUF IP is copied to other device instances, these rogue devices cannot unlock the IP or use it because every device has a different hardware fingerprint.
Other use cases: Secure key storage, flexible key provisioning, HW-SW binding, secure communication, authentication
Synopsys Hardware-based PUF IP - 100 is available in off-the-shelf configurations with sizes ranging between 39k and 64k gates. Configurations differ according to functionality, performance, and compliance.
Synopsys Hardware-based PUF IP - 100 v1.0 Configurations | |
---|---|
Generate device keys and random values | ✓ |
Wrap and unwrap keys | (✓) |
Size (k gates) | 39-64 |
AC size (bytes) | 1000 |
Security strength (bits) | 256 |
Maximum key length (bits) | 4096 |
Time to root key (k cycles) | 49-68 |
SRAM required for PUF (kB) | 2-4 |
Interface | APB |
Logic BIST | (✓) |
SRAM health checks | ✓ |
SRAM anti-aging | ✓ |
PUF monitoring | ✓ |
Attack countermeasures | ✓ |
NIST CAVP certification (DRBG, AES, KDF) | (✓) |
NIST SP 800-90 compliant | (✓) |
(✓) features are optional
Synopsys Hardware-based PUF IP has been embedded on MCU/SoC/ASICs in a diverse set of foundry/process node combinations. SRAM PUF responses have been qualified for use with Synopsys-Hardware-based PUF IP in a wide range of operational environments.
Synopsys Hardware-based PUF IP - 100 can be integrated easily into any semiconductor design across all foundries and process nodes. Standard deliverables include:
The Synopsys Hardware-based PUF IP - 100 driver eases developers' use of the Hardware IP in an embedded software environment. It is delivered as C source code and comes with a reference manual, integration tests, and the Synopsys Hardware-based PUF - 100 register description.