Synopsys PUF Base/Premium

Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are needed to get these credentials into the billions of connected devices and keep them secure.

Synopsys PUF is the world-leading and certified PUF IP solution that enables device manufacturers and designers to secure their products with internally generated, device-unique cryptographic keys.

Synopsys PUF uses the inherently random power-up values of SRAM as a physical unclonable function (PUF), which generates the entropy required for a strong root key. Because it uses a standard component available upon initial release of any process technology (SRAM) as a PUF source, Synopsys PUF can be used with any foundry and process-node technology.

Synopsys PUF Premium is the world’s first IP solution to be awarded “PSA Certified Level 3 RoT Component and SESIP Level 3.” This certifies that the IP includes substantial protection against both software and hardware attacks. It allows chip designers to fast-track their products for full PSA Level 3 certification and further helps ensure supply chain integrity, chiplet security, and protection against reverse engineering. Certification is essential for security-critical IoT market verticals, such as healthcare, critical infrastructures, and smart consumer products, as outlined in the US Cyber Mark Program.

Synopsys PUF can be applied easily to almost any chip – from tiny microcontrollers (MCUs) to high-performance systems-on-chip (SoCs). The IP is FIPS 140-3 ready and has been proven in hundreds of millions of devices certified by EMVCo, Visa, CC EAL6+, PSA, ioXt, and governments across the globe.

Synopsys PUF Base/Premium – Datasheet


  • Proven and mature PUF solution and world’s first IP to be awarded “PSA Certified Level 3 RoT Component and SESIP Level 3”
  • Uses standard SRAM power-up values as a PUF and is quantum safe
  • Offers key provisioning, wrapping, and unwrapping to enable secure key storage across the supply chain and for the entire lifetime of the device
  • Keys are never stored, but re-created from the PUF each time they are needed, offering a higher level of security than traditional key storage in NVM
  • Keys are bound to the device and can only be recreated and accessed on the device they have been created on
  • Integrates easily and scales with all fabs and technology nodes