Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys
SRAM PUF has been deployed in Arm, Intel and RISC-V processor environments.
More than 300 million devices are secured with SRAM PUF.
Features
- Low Cost, Flexible & Secure:
- This software-only product is easy to integrate and improves time to market. No need for additional or modified silicon. Wrapped keys can be stored securely in unprotected memory. BK works on all MCUs, CPUs and allows for brownfield deployments of hardware-based security.
- Operating Ranges: SRAM PUF responses have been qualified for use with BK over a wide operating range:
- Qualified top semiconductor fabs and technology nodes ranging from 350nm down to 5nm
- Semiconductor processes include low power, high speed and high density
- Temperature range from -55°C to 150°C [-67°F to 300°F]
- Voltage supply variation +/- 20%
- Lifetime > 25 years
Benefits
- Use standard SRAM
- Unclonable and immutable
- Device-unique high-quality keys
- No secrets when power is off
- No root key programming
- Flexible and scalable
Deliverables
- BK Software IP is delivered as a library compiled for a specific target chip, along with API specifications and user manual.
- BK software is available in different configurations and sizes. Contact Sales[@]Intrinsic-ID.com to learn more about BK configurations that might fit in your specific application. Some examples are:
- BK-Pro Device-unique key derivation, random number generation, key wrapping and management, elliptic curve-based public key crypto functions (ECDSA and ECDH), and optional public key infrastructure (PKI) elements such as certificate signing request (CSR)
- BK-Plus Device-unique key derivation, random number generation, application key wrapping and management
- BK-Safe Low footprint, device-unique key derivation and random number generation
Block Diagram of the Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys

View Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys full description to...
- see the entire Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys datasheet
- get in contact with Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys Supplier
IoT
- NB-IoT Protocol stack L2L3 and L1-Control and Service Layer
- NIST-Certified Random Number Generator, software-only implementation using SRAM start-up values as source of randomness
- Lens Distortion Correction (LDC) for Ultra-Wide Angle Lens & Fish-Eye Generation
- LTE-M(Cat-M) Protocol stack L2L3: 3GPP Release-14
- UMTS