IoT device makers need a way to protect keys and other secret material by encrypting or wrapping them with other keys. But how to protect the root key? How to keep secret keys secret?
Solution: SRAM PUF-based Key Vault
No unencrypted secrets stored on chip
Secret data and secret (user) keys are protected/wrapped with a root key that is not stored
SRAM PUF does not leak information about the root key
Root key is generated from SRAM PUF when needed
By using Synopsys IP, the SRAM PUF on the device is turned into a device-unique PUF root key
From this PUF root key, other keys, such as AES encryption keys, can be created
When secrets need to be unwrapped, the unwrapping key is regenerated from the SRAM PUF and Synopsys IP
Ask Synopsys
BETA
This experience is in beta mode. Please double check responses for accuracy.
i
NOTICE: You are interacting with an AI-powered chatbot that provides general information about Synopsys, including its products and services, which may be incorrect or incomplete. In the event of any conflict or discrepancy, the terms of your applicable agreements supersede any information provided by this chatbot. These chats may be accessed by Synopsys and its service providers to customize the experience and improve this tool, and your use of this chatbot is an agreement to that data processing activity.
End Chat
Closing this window clears your chat history and ends your session. Are
you sure you want to end this chat?
Legal Disclaimer
NOTICE: You are interacting with an AI-powered chatbot that provides general information about Synopsys, including its products and services, which may be incorrect or incomplete. In the event of any conflict or discrepancy, the terms of your applicable agreements supersede any information provided by this chatbot. These chats may be accessed by Synopsys and its service providers to customize the experience and improve this tool, and your use of this chatbot is an agreement to that data processing activity.