본문 바로가기
Products

PRODUCTS

Security IP

vPUF

Stay secure against evolving threats - with ICTK's trusted Security IP.

vPUF 6 Key Features

01
Easy & Quick Integration
  • Provided as a customizable Soft IP (RTL) for rapid customer integration
02
Standard CMOS Process
  • No additional process steps required for PUF implementation
03
Compliance with International Standard (ISO/IEC 20897)
  • Meets all six PUF implementation requirements
  • Superior stability compared to competitors
04
World-Class Technology
  • No need for ECC (Error Correction Code) or additional memory for data compensation
05
High Key Security
  • No key injection required - each device generates its own unique key
06
Strong Key-Based Security Principle
  • Supports generation of up to 4 billion unique keys through PUF Key and KDF
  • *KDF: Key Derivation Function

vPUF (Basic / Elite)

Choose the solution that fits your project - Basic or Elite

vPUF Basic
  • Secure Key Storage - Confidential data protected by PUF
  • Private Key Generation - Based on public-key cryptographic algorithms
  • Intrinsic Device ID - Silicon fingerprint of the chip
  • Trusted Supply Chain - Supply chain management leveraging PUF
  • Anti-Tampering Protection
vPUF Elite
  • All Basic functions
  • Symmetric Key Generation - AES, ARIA, SEED, etc.
  • Security Parameter Generation - IV, nonce, OPT, etc.

Cryptographic Algorithm IP

AES

AES

Advanced Encryption Standard

AES (Advanced Encryption Standard) is the world's most widely used symmetric block cipher. It delivers high speed and strong security compared to other symmetric or asymmetric algorithms, making it ideal for performance-critical applications.

Data Storage Network Communication (TLS, VPN)
ECC

ECC

Elliptic Curve Cryptography

ECC (Elliptic Curve Cryptography), one of the leading public-key algorithms, achieves equal or higher levels of security than RSA and other traditional methods, with much smaller key sizes — offering both efficiency and robustness in modern cryptographic systems.

Integrity Authentication Non-repudiation
HMAC

HMAC

Hash-based Message Authentication Code

HMAC is a type of Message Authentication Code (MAC) that combines a hash function with a secret key to verify message integrity and authenticity. It ensures that the message has not been tampered with or altered during transmission, providing a reliable way to confirm both data integrity and origin authentication.

Integrity Authentication

Ready to Secure Your Future?

ICTK's quantum security experts will assess your security environment and recommend the optimal solution.