214182392 © Pavlinec | Dreamstime.com
cxl_txc_214182392__pavlinec__dreamstime
Dreamstime_kasto80_112416068
dreamstime_kasto80_112416068
RISC-V Consortium | Dreamstime.com
ada_trends_promo
ID 94875025 © Danciaba | Dreamstime.com
riscv_architecture_promo_id_94875025__danciaba__dr
Dreamstime.com
creating_ada_promo
Chapter4 63406da34f31b

The Physically Unclonable Function Delivers Advanced Protection (Download)

Oct. 7, 2022
Download the PDF of the fourth chapter of the “The Cryptography Handbook.” It takes a detailed look at the physically unclonable function, or PUF, which generates a unique key to support crypto algorithms and services.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In cryptography and within embedded security ICs, the physically unclonable function (PUF) is used to create keys that are generated on-demand and instantaneously erased once used. Because PUF depends on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process, it’s virtually impossible to duplicate or clone.

PUF technology natively generates a digital fingerprint for its associated security IC. That can be utilized as a unique key/secret to support cryptographic algorithms and services, including encryption/decryption, authentication, and digital signature.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!