DesignWare OTP XPM NVM IP with SecretCode

As illegal hackers and competitors become more sophisticated, securing high-value intellectual property and sensitive data becomes increasingly important. To protect sensitive information, encryption keys are used to scramble the information. These “keys” are then stored in non-volatile memory (NVM) such as Flash or eFuse. However, these memory devices are inherently simple to reverse engineer. That is why customers are turning to antifuse memory as the choice for key storage in the physical layer.

Synopsys' antifuse-based one-time programmable (OTP) embedded XPM NVM IP with SecretCode is an ideal efuse replacement solution for systems requiring higher security. It is a secure, field-programmable memory that provides larger capacity with a smaller footprint and lower active and standby power.

All eFuse technologies give away their contents through semi-invasive methods such as device deprocessing and observation of the silicide or metal link break. With antifuse technology, the contents are not observable since the breakdown is in the gate oxide (Figure 1). Even with the scanning electron microscope (SEM), it is still impossible to differentiate between a programmed bit (a) and unprogrammed bit (b).

Contents in antifuse OTP NVM IP are not visible
Figure 1: Contents in antifuse OTP NVM IP are not visible

DesignWare NVM IP Complete Solution
DesignWare OTP XPM NVM IP with SecretCode
Selecting NVM IP for Your SoC

 

Highlights
  • 4kb to 32kb memory modules
  • Highly secure antifuse bit cell
  • Global programming lock
  • Tamper detection for power glitching
  • Tamper detection and output disabling for data corruption
  • Even/uniform power distribution regardless of data content
  • Optional charge pump
  • Proven in standard CMOS process technologies, including FinFET