Broadkey is a software product based on SRAM PUF which can be used to create and manage keys. Broadkey runs on a microcontroller or microprocessor core but does not require specific SRAM set aside in the silicon design to act as the PUF. This means that Broadkey does not have to be loaded at silicon production time but can be installed later in the supply chain or even retrofitted on deployed devices extending Intrinsic-ID’s market to OEMs and service providers.
Citadel utilizes the SRAM PUF technology to generate root keys internally from silicon, minimizing the liabilities in the supply chain. Any sensitive material on the chip can be protected with public keys derived from the invisible SRAM PUF root key. Citadel comes with a package of additional hardware and software IP, manufacturing tools and OEM management tools for things such as service logins.
Intrinsic-ID’s unclonable function is based on the cross-coupled bistability of a line of SRAM cells that will power up as either a 1 or a 0. If steps are taken to remove any design influence then variations in the manufactured silicon create the inherent preferred power-up state and a line of such SRAM cells provides a multi-bit word that is repeatable but specific to the specific silicon implementation and hidden.
Intrinisic-ID has provided this SRAM PUF as Quiddikey semiconductor IP but with the advent of Broadkey this is now generalized to almost all software-programmable ICs without need for security-dedicated silicon. Broadkey comes in three grades – Light, Flex and Flex-E with Flex-E offering the option of additional asymmetric encryption.
“With Broadkey it is even possible to deliver authentication and encryption solutions to devices in the field through firmware updates,” said Pim Tuyls, CEO of Intrinsic ID.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.