Latest from Embedded

ID 111118982 © Korn Vitthayanukarun | Dreamstime.com
pcie_dreamstime_l_111118982
144516710_Vladimir_Timofeev_Dreamstime
promo__id_144516710__vladimir_timofeev__dreamstime
ID 84308884 © Andy Chisholm - Dreamstime.com
promo_id_84308884__andy_chisholm__dreamstime
Dreamstime_Monsit-Jangariyawong_117103442
dreamstime_monsitjangariyawong_117103442
Tony Vitolo/Electronic Design
promo1920x1080
Chapter4 63406da34f31b

The Physically Unclonable Function Delivers Advanced Protection (Download)

Oct. 7, 2022
Download the PDF of the fourth chapter of the “The Cryptography Handbook.” It takes a detailed look at the physically unclonable function, or PUF, which generates a unique key to support crypto algorithms and services.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In cryptography and within embedded security ICs, the physically unclonable function (PUF) is used to create keys that are generated on-demand and instantaneously erased once used. Because PUF depends on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process, it’s virtually impossible to duplicate or clone.

PUF technology natively generates a digital fingerprint for its associated security IC. That can be utilized as a unique key/secret to support cryptographic algorithms and services, including encryption/decryption, authentication, and digital signature.