The Physically Unclonable Function Delivers Advanced Protection (Download)

Download the PDF of the fourth chapter of the “The Cryptography Handbook.” It takes a detailed look at the physically unclonable function, or PUF, which generates a unique key to support crypto algorithms and services.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In cryptography and within embedded security ICs, the physically unclonable function (PUF) is used to create keys that are generated on-demand and instantaneously erased once used. Because PUF depends on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process, it’s virtually impossible to duplicate or clone.

PUF technology natively generates a digital fingerprint for its associated security IC. That can be utilized as a unique key/secret to support cryptographic algorithms and services, including encryption/decryption, authentication, and digital signature.

Sign up for our eNewsletters
Get the latest news and updates

Voice Your Opinion!

To join the conversation, and become an exclusive member of Electronic Design, create an account today!