Cloud native EDA tools & pre-optimized hardware platforms
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Things (IoT) has exploded. Processes are remotely monitored through networks of smart devices. And every device represents a potential entry point for malicious intrusion – into the device itself or the network to which it’s connected.
Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, RoT technology shouldn’t be limited to hardware design, confining IoT developers to functions programmed at manufacture. The Synopsys Software-based PUF IP embedded solutions democratize RoT technology by uncoupling it from silicon fabrication, ensuring IoT application developers can access, understand, and implement it at scale.
The Synopsys Software-based PUF IP products use the inherently random start-up values of SRAM as a PUF from which a device-unique identity and root key are generated. The root key is never stored and is only available (in-volatile memory) when needed. This means the key is never present in persistent memory – even when the chip is powered down – which raises the security significantly and eliminates the need for OTP or other secure memory.
An unlimited number of keys can be derived from the root key using the NIST-compliant key-derivation function. Synopsys Software-based PUF IP also offers random values generated by a NIST 800-90A/B-compliant random number generator. All Synopsys Software-based PUF IP features are accessed by the host software via the API.
The Synopsys Software-based PUF - 100 API enables IoT developers to generate unique device identities, secure cryptographic keys, and random values. It enables easy and collision-free identification of billions of devices from various vendors. Synopsys Software-based PUF - 100 can also be integrated as a hardware-based trust anchor for Mbed TLS, OpenSSL, wolfSSL, and other libraries, extending the chain of trust beyond just a single device.
Synopsys Software-based PUF IP - 200 IP is a secure key generation, management, and storage solution for any IoT device. It offers functions to wrap and manage secret keys and encrypt data, which can then be stored in unprotected memory or securely transmitted over the network. The Synopsys Software-based PUF IP - 200 also offers random values generated by a NIST 800-90A/B-compliant random number generator and a collision-free unique device identity.
Every device needs an unclonable identity, which consists of a secret key, a public key, and a certificate, to solve security problems in IoT systems, such as authentication, product lifecycle management, reverse engineering, and cloning.
The biggest challenge is getting these credentials into the device and keeping the secret key secret. This can be achieved by using Synopsys Software-based PUF IP - 300, which offers the strongest protection of the device secret key and the strongest authentication via unclonable identities. Synopsys Software-based PUF IP - 300 offers all the features of Software-based PUF - 200. In addition, Synopsys Software-based PUF IP - 300 offers asymmetric cryptography: public key crypto functions such as ECDSA sign and verify, and ECDH shared secret. PKI elements, such as ECIES and certificate signing request (CSR) are optional.
SRAM PUF responses have been qualified for use with the Synopsys Software-based PUF IP products in a wide range of operational environments over years of field operation:
The Synopsys Software-based (SW-based) PUF IP products are available in off-the-shelf configurations with sizes ranging between 6.3 kB and 29 kB. Configurations differ according to functionality, performance, and compliance.
Specifications | SW-based PUF -100 Standard |
SW-based PUF-100 FIPS 140-3 Ready |
SW-based PUF - 200 Standard |
SW-based PUF - 200 FIPS 140-3 Ready |
SW-based PUF - 300 Standard |
SW-based PUF - 300 FIPS 140-3 Ready |
---|---|---|---|---|---|---|
Security strength (bits) | 128 / 256 |
128 / 256 |
128 / 256 |
128 / 256 |
128 / 256 |
128 / 256 |
Code size (kB) | 6 |
8 |
10 / 13 |
11 / 14 |
16-21 / 19-28 |
17-23 / 20- 29 |
SRAM for PUF (KiB) | 0.7 / 1.0 |
2.8 / 4.0 |
0.7 / 1.0 |
2.8 / 4.0 |
0.7 / 1.0 |
2.8 / 4.0 |
Activation Code (bytes) | 672 / 984 |
672 / 984 |
672 / 984 |
672 / 984 |
672 / 984 |
672 / 984 |
Device-unique identifier (UID) |
✓ |
✓ |
✓ |
✓ |
✓ |
✓ |
Generate device-unique keys | ✓ |
✓ |
✓ |
✓ |
✓ |
✓ |
Generate random values | ✓ |
✓ |
✓ |
✓ |
✓ |
✓ |
Wrap and unwrap secrets | ✓ |
✓ |
✓ |
✓ |
||
Encryption on the fly | ✓ |
✓ |
✓ |
✓ |
||
Public key crypto functions* | ✓ |
✓ |
||||
PKI elements** | (✓) |
(✓) |
||||
NIST CAVP certification | ✓ |
✓ |
✓ |
✓ |
✓ |
✓ |
NIST SP 800-90B compliant entropy source for RNG | ✓ |
✓ |
|
✓ |
* Includes ECDSA sign and verify, ECDH shared secret, standard elliptic-curve support set: P256, P384, P521
** Elliptic curve integrated encryption scheme (ECIES), certificate signing request (CSR), self-signed certificates (SSC)
Markets | Applications |
Certifications |
|
|
|