Sophisticated invasive attacks are frequently launched in an attempt to obtain cryptographic keys from secure ICs. If obtained, the security provided by the IC is thoroughly compromised. A key derived from a physically unclonable function (PUF) provides an unprecedented level of protection against invasive attacks, since the PUF-based key does not exist in memory or another static state.
In our PUF-based ChipDNA™ secure authenticators, each key exists as a precise analog characteristic of the IC, making it immune to all known invasive attack tools and capabilities. Each IC’s unique ChipDNA-generated key, since it is based on a physical unclonable function, is repeatable over temperature, voltage, and IC operating life conditions.
ChipDNA PUF security technology provides an exponential increase in protection against the invasive and reverse engineering attacks that hackers apply. Attempts to probe or observe ChipDNA operation modifies the underlying circuit characteristics, preventing the discovery of the unique value used by the chip cryptographic functions. Similarly, more exhaustive reverse-engineering attempts are defeated due to the factory conditioning required to make the ChipDNA circuitry operational. The per-device unique key is generated by the ChipDNA circuitry only when needed for cryptographic operations and is then instantaneously deleted.
Most importantly, the ChipDNA secure key never resides statically in registers or memory, nor does it ever leave the electrical boundary of the IC. In addition to the protection benefits, ChipDNA simplifies or eliminates the need for secure IC key management. The ChipDNA-generated key can be used directly for functions such as:
Block diagram of a DeepCover® secure authenticator with ChipDNA PUF protection
Use case examples for ChipDNA embedded security PUF technology include internal memory encryption, external memory encryption, and authentication key generation.
Common use cases for ChipDNA PUF embedded security technology