As the world becomes increasingly connected, the underlying technology that connects us becomes ever more important to ensure that we can all enjoy these technological advances. Devices that in years past wouldn’t even be considered to have a use case for technology are now connectable to any network and able to be controlled remotely. To say that the Internet-of-Things (IoT) is proliferating through our modern society is an understatement.
This proliferation of technology, however, doesn’t come without cost. Edge devices are much more likely to be targeted by attackers in an attempt to gain access to networks. This has led to an increase of cyber attacks, and now more than ever, protecting devices is at the forefront of many people’s concerns.
One emerging technology that provides great hardware root-of-trust and authentication is Physical Unclonable Functions, or PUFs. PUFs have offer many benefits to securing devices that can’t be offered by other cybersecurity solutions, and as such that have catapulted their way into many SoC designs.
This whitepaper overviews the different types of PUFs that are available in the market today. It zeros in on two core PUF architectures: linear and exponential. The paper discusses the architecture GMT uses for its Giga-PUF, and highlights the reasons why this architecture – combined with GMT’s stability boost technology – enables PUF implementations that are far more secure and versatile than any other existing solutions.
Fill out the form on this page to get access to the PUF Whitepaper, and start your company’s journey down the path of securing your ICs with GMT’s Giga-PUF products.