Latest from Embedded

Irina Toloknovskaia, Dreamstime.com
Circuit Diagram51965608 © Irina Toloknovskaia Dreamstime
ID 122748715 - Design © Everythingpossible - Dreamstime.com
Planner manipulating chart
ID 340558606 - Ai © Yulia Gapeenko - Dreamstime.com
promo__id_340558606__ai__yulia_gapeenko__dreamstim
Dreamstime_thekaikoro_137795256
dreamstime_thekaikoro_137795256_promo
ID 317960473 | Ai Communications © Neirfy | Dreamstime.com
digital_dreamstime_l_317960473
Dreamstime_ruslan-gilyazov_112242079
dreamstime_ruslangilyazov_112242079
Chapter4 63406da34f31b

The Physically Unclonable Function Delivers Advanced Protection (Download)

Oct. 7, 2022
Download the PDF of the fourth chapter of the “The Cryptography Handbook.” It takes a detailed look at the physically unclonable function, or PUF, which generates a unique key to support crypto algorithms and services.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In cryptography and within embedded security ICs, the physically unclonable function (PUF) is used to create keys that are generated on-demand and instantaneously erased once used. Because PUF depends on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process, it’s virtually impossible to duplicate or clone.

PUF technology natively generates a digital fingerprint for its associated security IC. That can be utilized as a unique key/secret to support cryptographic algorithms and services, including encryption/decryption, authentication, and digital signature.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!