PUF-based Secure Crypto Coprocessor
The security boundary for PUFcc is quite robust, based on physical separation of hardware, with less vulnerability than a software-only barrier. The on-board PUF is a naturally well-protected source of static entropy, suitable for SoC architects to build a system’s key hierarchy using established key generation and management procedures. In addition, PUFcc’s crypto engines can perform a wide variety of secure operations, such as key exchange, secure boot or TLS (public key validation and signing), authentication (MAC), or key wrapping (again based on the natural randomness inherent to the PUF) and store said wrapped keys to external memory.
View PUF-based Secure Crypto Coprocessor full description to...
- see the entire PUF-based Secure Crypto Coprocessor datasheet
- get in contact with PUF-based Secure Crypto Coprocessor Supplier