Sophisticated invasive attacks are frequently launched in an attempt to obtain cryptographic keys from secure ICs. If obtained, the security provided by the IC is thoroughly compromised. A key derived from a physically unclonable function (PUF) provides an unprecedented level of protection against invasive attacks, since the PUF-based key does not exist in memory or another static state.

In our PUF-based ChipDNA secure authenticators, each key exists as a precise analog characteristic of the IC, making it immune to all known invasive attack tools and capabilities. Each IC’s unique ChipDNA-generated key, since it is based on a physical unclonable function, is repeatable over temperature, voltage, and IC operating life conditions.

ChipDNA PUF security technology provides an exponential increase in protection against the invasive and reverse engineering attacks that hackers apply. Attempts to probe or observe ChipDNA operation modifies the underlying circuit characteristics, preventing the discovery of the unique value used by the chip cryptographic functions. Similarly, more exhaustive reverse-engineering attempts are defeated due to the factory conditioning required to make the ChipDNA circuitry operational. The per-device unique key is generated by the ChipDNA circuitry only when needed for cryptographic operations and is then instantaneously deleted.

Most importantly, the ChipDNA secure key never resides statically in registers or memory, nor does it ever leave the electrical boundary of the IC. In addition to the protection benefits, ChipDNA simplifies or eliminates the need for secure IC key management. The ChipDNA-generated key can be used directly for functions such as:

  • Root key for derived key operations
  • Symmetric secret to encrypt/decrypt data stored in the nonvolatile memory of the secure IC
  • Private key for ECDSA signature generation
  • Private key for ECDH key establishment

Use case examples for ChipDNA embedded security PUF technology include internal memory encryption, external memory encryption, and authentication key generation.

Common use cases for ChipDNA PUF embedded security technology

Technical Documentation


Technical Documentation

Technical Documents

Showing 10 of View Top 100 Results View All Result(s)

Part Number Title Document Type Date


How ChipDNA PUF Technology Delivers the Highest Level of IoT Security
3:57 June 02, 2020

How ChipDNA PUF Technology Protects Your Secrets
0:30 January 24, 2019

ChipDNA–Defend Your IoT Designs from Hackers
2:14 November 17, 2017

Latest Blogs

See If You Can Steal These Keys

September 03, 2019

Ben Smith narrates a 30-second video that explains how ChipDNA physically unclonable function technology secures embedded designs.

Product Image


Arm Cortex M4 Micro provides FIPS/NIST compliant TRNG with environmental and tamper detection ci...
Product Image


Cost-effective protection with ECDSA authentication, ChipDNA secured data, and 2kB EEPROM
Product Image


Simple, cost-effective protection with SHA3-256 crypto engine, ChipDNA secured data, and 2kB EEP...