QDID™ PUF IP

Our patented PUF design generates a unique identity based on quantum tunnelling current variations through the gate terminal in any standard CMOS process. The source of the randomness stems from the device’s oxide thickness variations and random distribution of defects (traps) in the gate oxide. A PUF realised based on these unpredictable and unclonable variations is the basis for a hardware root-of-trust on which a security architecture can be built.

Book an IP evaluation Contact sales

Secure provisioning

QDID™ PUF removes the challenges associated with secure provisioning through key injection on a factory floor, reducing the cost and complication of HSMs as well as the risks associated with trusting third parties

Secured identities

Identities are not stored in the memory, but just created on-the-fly, making them resistant against side-channel attacks on memory

High entropy seeds

QDID™ PUF’s source of entropy is based on a quantum phenomenon and resistant to machine learning-based attacks of the entropy source.

Customisable number of seeds of security strength up to 256 bits can be generated on demand.

Built-in resistance to side channel attacks

The PUF IP has been developed with a “secure by design” approach which has built in resistance to secret leakage through countermeasures and attack detection schemes

Certification & compliance

PSA Level 2 Ready
CC EAL4+ compliant

Environmental operating data

QDID™ PUF has been tested extensively under varying environmental conditions and achieved a lifetime operating time of greater than 25 years between −40°C to 125°C

Randomness health test

NIST SP 800-22 randomness
NIST SP 800-90B entropy

Process
nodes

QDID™ PUF IP has been verified on major fabs (TSMC, GF, UMC) across Bulk CMOS, FDSOI, FinFET process technologies (55nm down to 12nm)

QDID™ PUF IP SoC integration

QDID PUF has the ability to generate multiple, uncorrelated keys that can be used for unique identities. These identities generated with the QDID PUF can be used for various cryptographic purposes, including symmetric and asymmetric as well as for post-quantum cryptographic algorithms.

The diagram on the left shows a diagram of QDID PUF used in a secure element. Using QDID PUF in a secure element eases the key management process at the secure IC level.

Applications

  • Key generation
  • Device identification
  • Device authentication
  • Device provisioning
  • Post-quantum cryptography
  • Supply chain security

Embed QDID™ PUF into your IoT devices

QDID™ PUF has endured many tests in accordance with National Institute of Science and Technology (NIST) standards and been verified to withstand traditional side-channel attacks. The IP’s robustness is verified across voltage, temperature and device ageing tests.

Talk to CQ experts for more about evaluating the IP.

Download datasheet Contact sales