Page 21 - 23_EETE_03
P. 21

EE|Times EUROPE   21

                                              Hardware Root of Trust: The Key to IoT Security in Smart Homes
                                                                                   A46_EETime_2_062x9_5_2023.qxp_Layout 1  2

          The transistors’ threshold voltages are   ENSURING RELIABILITY OVER TIME
        different, but not too different, or else the   All electronic devices gradually change over
        chip would not work electrically. And when   time. They simply age, and the main degra-
        the physical properties of the transistors   dation effect that leads to SRAM failure is
        change, they all change with roughly the   negative-bias temperature instability (NBTI).   DC-3 Series
        same value.                         It causes a gradual increase in the threshold   DC-1 Series
          When the SRAM is powered on, the ran-  voltage.                           DC-2 Series
        domness is expressed in the startup values   If no anti-aging countermeasures are taken,
        (0 or 1) of SRAM cells, and the startup values   SRAM PUFs tend to become less reliable.
        create a highly random and repeatable   “With our SRAM PUF, we can use the NBTI
        pattern that is unique to each chip, Tuyls   phenomenon to our advantage by writing a
        explained. There is SRAM in every digital   specific pattern into the SRAM such that every       HiQP Series
                                                                                         Certified to
        chip, and SRAM is available in every node.   SRAM cell ages to its preferred startup value,”   ISO 9001:2015
                                                                                         AS9100D
        When the power comes up, every cell chooses   Tuyls said. “We can make an SRAM age in the
        a unique and random pattern of 0s and 1s.   right direction to decrease the noise and
        This pattern results in a silicon fingerprint   guarantee its reliability over long periods of   DC-DC
        that serves as a unique identifier for the chip   time.”
        and builds the foundation of a security sub-  The behavioral characteristics of an SRAM   CONVERTERS
        system. And when the device is powered off,   PUF depend on the environment to which
        no secret key can be found in any memory.   it is exposed, such as ambient temperature,
        The root key is “invisible” to hackers.  supply-voltage variation and electromag-  NEW!
          “SRAM is volatile, which means that if   netic interference. Intrinsic ID claims it has
        you power off the chip, all values disappear,”   performed millions of measurements and   HIGH INPUT VOLTAGES
        Tuyls said. “There is no trace in the memory,   accelerated aging tests on SRAM PUFs to
        so even if hackers break open the device, they   make sure they work correctly in tempera-  UP TO 1200 VDC
        will not find any secrets. They are protected   tures ranging from –55˚C to 150˚C, with a
        from the physics, and that brings security   voltage variation of ±20%.              DC-1 Series
        levels substantially higher to what has been   Intrinsic ID has integrated the error   • 120-370 VDC input voltage range
        possible in legacy systems.”        correction, randomness extraction, security   • 5-300 VDC regulated isolated outputs
                                                                                         • Up to 300 watts output power
          SRAM PUFs do not store a key, and what   and anti-aging techniques into its products.   • 4.5” X 2.5” X 0.50” encapsulated package
                                                                                                    •
        is not stored cannot be stolen, cloned and   Today, its SRAM-based PUFs are deployed in   DC-2A/2B Series
        shared. SRAM PUFs protect secrets from   MCUs, FPGAs, sensors, data center chips and   • 350-1200 VDC input voltage range
        reverse-engineering attacks. They are also   banking cards.                   • 5 -300 VDC regulated isolated outputs
        flexible, scalable, easy to use and low-cost,                                 • Up to 300 watts, single and dual outputs
        Tuyls said.                         COMPLYING WITH PROTOCOLS AND               • Thru hole and terminal strip models
                                                                                                   •
                                            CERTIFICATIONS                                   DC-3 Series
        EXTRACTING AN ENCRYPTION KEY        As customers add features, their security   • 300-900 VDC input voltage range
        The SRAM PUF is used to derive a cryp-  expectations increase and their demands for   • 3.3 -300 VDC regulated isolated outputs
        tographic key unique to the device. Because   certification and standardization become   • Up to 50 watts, single and dual outputs
        the response from the SRAM PUF is a noisy   more pressing. Intrinsic ID’s hardware and   • Thru hole and terminal strip models
                                                                                                  •

        fingerprint, a post-processing algorithm is   software IP have been certified for the NIST   HiQP Series
        needed to turn the silicon fingerprint into a   Cryptographic Algorithm Validation Program   • 125-475 VDC input voltage range
        high-quality and secure cryptographic key.   (CAVP). They have also been deployed in   • 24-200 VDC regulated isolated outputs
                                                                                         • Up to 50 watts output power
        This is done with Intrinsic ID’s IP.  devices certified by EMVCo, Visa, CC EAL6+,   • 2.50” X 1.55” X 0.50” encapsulated package
          “We have developed an algorithm that   PSA, ioXt and governments worldwide.
                                                                                        ALL MODELS AVAILABLE WITH
        extracts from the startup values of the SRAM   “One of the trends that we are seeing for   EXPANDED OPERATING TEMPERATURES
        a unique and very stable sequence,” Tuyls   2023 is the adoption of the Matter protocol,”   SELECTED MILITARY SCREENING
        said. “‘Unique’ because no other chip is the   said Vincent van der Leest, product market-  CUSTOM DESIGNS
        same and ‘stable’ because, whether you use   ing director at Intrinsic ID. Matter, formerly   VISIT OUR EXCITING NEW WEBSITE
        that chip in Phoenix or in Alaska, or 25 years   Project Connected Home over IP (CHIP), is an   For full characteristics of these and the entire PICO product
        from now, you will always end up with the   open-source interoperability standard that   line, see PICO’s Full line catalog on our NEW WEBSITE
        same sequence.”                     aims to make smart-home devices secure, reli-  www.picoelectronics.com
          The algorithms address error correction to   able and seamless to use. In November 2022,   Pico Representatives
        extract exactly the cryptographic key every   the Connectivity Standards Alliance (CSA)   England
        time and under all environmental circum-  released the Matter 1.0 standard for both   Solid State Supplies/Ginsbury
                                                                                      E-mail: russell.bennett@sssltd.com
        stances. They also cover entropy extraction,   hardware and software.      Phone: 44 1634 298900 • Fax: 44 1634 290904
        or privacy amplification, to make sure the   Van der Leest said NXP and Silicon Labs   Belgium/Luxemburg/France
        cryptographic key is fully random.  have both released Matter-compliant chipsets   Netherlands/Scandinavia
                                                                                              ELCOS/BVBA
          In smart homes, cryptographic keys are   using Intrinsic ID’s root-of-trust      E-mail: info@elcos.be
        needed to verify the device’s identity, secure   technology. ■               Phone: 32 3 218 20 73 • www.elcos.be

                                                                                              Germany
        the communication between devices and                                          ELBV/Electra Bauemente Vertrieb
        encrypt sensitive data at rest as well as in   This article ran as part of the EE Times Special   E-mail: info@elbv.de
        transition. They create a chain of trust for IoT   Report: Embedded in the IoT Era, which may   Phone: 49 089 460205442
                                                                                          Fax: 49 089 460205442
        devices.                            be read at bit.ly/3lxWhwV.
                                                                                      www.eetimes.eu | MARCH 2023
   16   17   18   19   20   21   22   23   24   25   26