EN
EN

SASpuf

Hardware Root-of-Trust IP
Most versatile PUF-based Solutions

Hardware Root-of-Trust IP
Most versatile PUF-based Solutions

Products made for you

Products made for you

Silicon Anchor Secure PUF Revolutionizing Hardware Security

Unlock the Power of Unclonable Security

Unlock the Power of Unclonable Security

Unlock the Power of Unclonable Security

Unlock the Power of Unclonable Security

In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount.

Introducing Silicon Anchor Secure PUF (SASpuf)—a groundbreaking hardware root-of-trust core IP designed to fortify your system-on-chips (SoCs) with unmatched security features.

What is a PUF?

What is a PUF?

What is a PUF?

Physically Unclonable Function

is a cutting-edge security technology that leverages the inherent variability in semiconductor manufacturing to create unique, unpredictable digital outputs.

This makes each PUF instance distinct, ensuring that no two devices are identical, even if they are produced from the same blueprint.

Why Do You Need a PUF?

Why Do You Need a PUF?

Why Do You Need a PUF?

Unique Identification

Each PUF generates a unique digital fingerprint, ensuring secure device identification.

Unpredictable Outputs

The randomness of PUF outputs makes them ideal for generating cryptographic keys and seeds.

Enhanced Security

PUFs are resistant to cloning and tampering, providing a robust foundation for secure applications.

SASpuf
Next-Gen PUF and TRNG

SASpuf takes the concept of PUFs to the next level by integrating a True Random Number Generator (TRNG) from a single entropy source.

Multiple Unique Identifiers

Multiple Unique Identifiers

Multiple Unique Identifiers

Generate multiple root keys from a single entropy source, ensuring uniqueness and steadiness.

True Randomness

True Randomness

Complies with ISO/IEC 20897 and NIST FIPS SP800-90A/B/C guidelines for true randomness.

Dynamic Entropy

Dynamic Entropy

Dynamic Entropy

Combines dynamic and steady randomness for unparalleled security.

Limitless Potential with Multiple Root-of-Trust

With SASpuf, you can create multiple root-of-trust within your SoC, enabling each subsystem to operate with its own isolated cryptographic rules, keys, and seeds.

Isolated Cryptographic Rules

Isolated Cryptographic Rules

Each subsystem operates independently, minimizing vulnerabilities.

Reduced Attack Surface

Limits the impact of potential security breaches.

Enhanced Interoperability

Enhanced Interoperability

Simplifies integration with different stakeholders and vendors.

Join forces with us
for unmatched security with PUF Technology

Seamless Technology Integration

Seamless Integration

Discover how PUF technology can secure your data and the Internet of Things, providing a reliable solution tailored to your industry.

NYCU-IIST R&D Center

NYCU-IIST Joint research Focused on hardware security technology development

Enhance your systems' protection with PUF

Elevate your security effortlessly with PUF technology, where innovation meets unmatched protection

service@iist.com.tw

FAQ

For any questions, check our FAQ where we've compiled the most requested information.

What challenges are involved in enhanced device authentication?

What challenges are involved in enhanced device authentication?

What are the challenges of scalability in IoT secure deployments?

What are the challenges of scalability in IoT secure deployments?

Why is secure key generation and storage important?

Why is secure key generation and storage important?

What is a true random number generator (TRNG) and why is it necessary?

What is a true random number generator (TRNG) and why is it necessary?

How does resistance to cloning enhance security?

How does resistance to cloning enhance security?

How can cost-effective security be achieved?

How can cost-effective security be achieved?