Giga-PUF vs. SRAM PUF
Giga-PUF vs SRAM PUF: How Do They Compare?
Point of Comparison
Giga-PUF
SRAM PUF
The Giga-PUF has an exponentially large number of random and repeatable bits that can be extracted to form a unique signature or key, as well as for many other security applications. This enables better security and protection for the unique keys, and means better security for any other applications enabled through the Giga-PUF product lines.
SRAM PUFs number of data bits available for secure unique key generation is limited by the size of the SRAM instantiated. This limited data bit set constrains the security and protection that an SRAM PUF can offer.
Due to the large number of bits in the Giga-PUF, characterization of the entire bit space is impossible. Thus, the Giga-PUF is natively resistant to machine learning attacks.
Due to the limited number of bits in SRAM PUFs, characterization of the entire bit space is possible. Thus, SRAM PUFs often require the implementation of additional protective layers to secure the PUF.
Many concurrent applications can be served by the Giga-PUF, including unique key generation, device enrollment and authentication, true random number generation, etc.
SRAM PUFs are normally used for only one application: unique key generation. Most do not have enough data bits to enable other security applications.
Giga-PUFs are synthesizable and implementable as soft IP. They are foundry and process node agnostic. This enables rapid, scalable adoption in any product.
SRAM PUFs are instantiated on SRAM hard IP in each node and at each foundry. This limits the true and rapid scalable nature of the IP.
Giga-PUFs provide ultimate key flexibility. A nearly limitless number of keys can be generated with large sizes.
SRAM PUFs are limited in the number of keys and the size of the keys it can generate, with many products offering only one key per PUF.
Giga-PUFs only utilize logic elements in the design, leading to much smaller overall circuit area.
SRAM PUFs utilize hardened memory components, requiring far larger area.
Due to their smaller size, Giga-PUFs use much less operational power compared to their larger counterparts.
Due to their larger size and hardened IP components, SRAM PUFs expend more operational power.
Giga-PUF incorporated IPs come with the optional enhancement to add true random number generation to the functionality of the PUF, further expanding PUF security applications.
True random number generation is not possible with the limited bits from an SRAM PUF.
The table directly below summarizes the detailed comparison data of the Giga-PUF vs SRAM PUF in a simple, concise format.
Point of Comparison |
The Giga-PUF |
The SRAM PUF |
---|---|---|
Security Data Bits |
An exponentially large number of random and repeatable bits; more secure |
The number of bits limited by the size of the SRAM instantiated; less secure |
Resistance to Adversarial Attacks |
Characterization of the entire PUF bit space is impossible; natively resistant to machine learning attacks |
Characterization of the entire bit space is possible; substantive additional protective layers required |
Functionality |
Many concurrent applications can be served by the PUF; unique key generation, device enrollment and authentication, random number generation, etc |
Limited bits are normally used to create one application: unique key generation |
Usability/Scalability |
Synthesizable and implementable as soft IP. Foundry and process node agnostic |
Instantiated on SRAM hard IP in each node and at each foundry |
Key/ID Flexibility |
Nearly limitless number of keys can be generated with large sizes |
Limited in the number of keys and the size of the keys it can generate; typically only one key per PUF |
Circuit Size |
Utilizes only logic elements in design; small overall circuit area |
Utilize hardened memory components; large overall circuit area |
Circuit Power |
Less operational power as a result of smaller size |
More operational power as a result of larger size and hardened IP components |
Random Number Generation |
Optional enhancement to add true random number generation functionality |
True random number generation is not possible with the limited bits |
Root-of-Trust with Giga-PUFs
The Giga-PUF enables stable, exponential PUF implementations that can be delivered as soft IP and integrated into any design. This provides the ability to scale quickly and easily to all circuit designs, allowing access to all companies to secure all their products.
The Giga-PUF offers excellent device security at low power, low compute, low area, and low cost. Please reach out to us to see what we can do to ensure your products are secure.
Get Started Today
Interested in what GMT’s Physical Unclonable Function technology can do to help secure your IC? Contact GMT today to start your PUF implementation to outpace the competition.
Additional Resources
Learn More About the Giga-PUF