You are safe with ICTK

We Protect Your Values!

2022 Go to Market[A letter from CEO] Samurai guns and PUF

-Justin J. Lee, CEO of ICTK Holdings 

June 1592, Chungju Tangeumdae. The Japanese army, who landed in the sea off Busan about half a month ago, experienced their first great battle since the start of the war. The Chosun army, who was retreating, reorganized its front lines and met the main base of Japanese commander Konishi Yukinaga at Tangeumdae.

The person who raised Chosun army's flag was General Shin-Rip, the most valiant general of the time. He was a person who had already achieved brilliant war results against Manchurian. There were a number of Chungju people who had unpacked their evacuation bags hearing that Genearal Shin was coming.

So the battle began. Since the time of the 1st King Taejo Lee Seong-gye, the typical method of the Chosun army's tactics was 'to charge forward on horseback', that is, cavalry warfare. General Shin's horses, which had been running vigorously through the Chungju plain as usual, fell down after a few steps. The cavalry's columnar charge formation on the open ground was just a good target for the Konishi Rifle Forces, which were lined up on the left and right.

Before the war, the Joseon gov. and military were aware of the existence of the latest Japanese weapons and guns. However, it was overlooked. Instead, they focused on traditional cavalry tactics. There has been no change in 200 years. The pay was harsh. Immediately after the battle, 8000 Chosun troops were virtually annihilated. Five days later, the capital, Hanyang, was captured.

Now, 400 years later, in the ICT construction industry of the Republic of Korea, a situation not different from that of that time is being reproduced. Although the apartment wall-pad hacking incident that made the whole country tremble in fear last year, both the government and the industry are lukewarm in applying the latest security technology. In the midst of this, the government has even introduced mandatory network separation between generations. It's another regulation.

It is not unfamiliar with the conservative atmosphere unique to construction businesses that are stingy in the introduction of new technologies. However, hacking technologies such as ransomware and Rogue 4j are evolving and developing in real-time units. How much longer are you ignorant of the introduction of cutting edge security technology, blaming the unprecedented and lack of verification?

Fortunately, there has been a shift in forward-looking posture in information security recently, centering on some innovative large construction companies. One of them is the introduction of ‘Physically Unclonable Functions (PUF)’ technology. PUF uses the difference in the microstructure of semiconductors produced in the same manufacturing process to generate a security key that cannot be physically copied. If the PUF chip is planted in the server end of the apartment management office in the complex or the wall-pad terminal in each household, it dramatically improves the physical security function in terms of user authentication as well as firmware protection.

ISO and GSA are paying attention to PUF as a key element in establishing a Root of Trust (RoT). The Korea Internet & Security Agency(KISA) specified PUF as a 'requirement' in the <IoT Security Manual>. The technical reliability and economic efficiency of PUF have already been officially verified worldwide.

The catastrophe of the 7th year caused by the disregard of the new weapon and the blind faith in the old tactics. The lessons of that day written by our ancestors in blood are still in the present for us.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.