• Home
  • Technology
    • Relative Timing Technology Overview
    • Technology Primer
  • Solutions
    • Design Services
    • Physical Unclonable Functions
    • SHA-256 bitcoin ASIC
    • Network on Chip
  • Careers
  • Collaborate
Granite Mountain TechnologiesGranite Mountain Technologies
Granite Mountain Technologies
  • Home
  • Technology
    • Relative Timing Technology Overview
    • Technology Primer
  • Solutions
    • Design Services
    • Physical Unclonable Functions
    • SHA-256 bitcoin ASIC
    • Network on Chip
  • Careers
  • Collaborate

Giga-ID

Giga-ID: Device Enrollment & Authentication

The Giga-ID is for customers who need to authenticate devices using hardware root-of-trust in all environments, but especially in remote edge devices and applications.

The Giga-ID is also ideal for customers who need devices with built in anti-counterfeiting protection, ensuring that a device is authentic and correctly sourced.

Giga-ID Enrollment

PUF circuits receive a sequence of bits as input (called challenges). Based on the input, a PUF generates a sequence of bits as output (called responses). The combination of the challenge and response is call a Challenge Response Pair (CRP).

Given sufficient CRPs, no two chips can generate identical responses to all the challenges due to the manufacturing variability, allowing unique identification of the chip. This serves as an anti-counterfeiting mechanism for all chips with Giga-ID.

Giga-ID Authentication

Step 1: Enrollment – a circuit with a PUF connects directly to a server. The server sends challenges, PUF sends responses. Server stores the CRP in a table. Then the circuit is mounted to a device.

Step 2: Authentication – the server sends arbitrary PUF challenge(s) to the device, the PUF sends response(s). If result matches the enrollment result for a particular challenge, device is authenticated.

Giga-ID Features

Secure Authentication

Ultra Secure

Technology Node Agnostic

FPGA Compatible

Resistant to ML Attacks

Anti-Counterfeiting

Crypto Key Replacement

Synthesizable

Small Circuit Area

Stability Boost Technology

Nearly Limitless Keys/Sizes

Foundry Agnostic

Low Power

TRNG Add-on

Concurrent Applications

Get Started Today

Interested in what GMT’s Physical Unclonable Function technology can do to help secure your IC? Contact GMT today to start your PUF implementation to outpace the competition.

Loading

Additional Resources

Learn More About the Giga-PUF

Interested in learning more about the Giga-PUF, or just PUFs in general? Check out the resources below for additional information on how PUFs can best secure your ICs.

The Giga-PUF

The Giga-Key

Giga-PUF vs SRAM PUF

PUF Whitepaper

Frequently Asked Questions

Random Number Generator

  • Granite Mountain Technologies, Inc.
  • 4001 S 700 E Ste 500, SLC, UT, 84107
  • 801-308-1122
  • info@gmt-semi.com
  • www.gmt-semi.com
  • Home
  • Technology
  • Solutions
  • Careers
  • Collaborate

© 2026 Granite Mountain Technologies, Inc. All Rights Reserved.