You are safe with ICTK

We Protect Your Values!

2013 The Encounter with HY univ.Hyundai AutoEver, ICTK, and Hanyang University develop embedded security technologies such as vehicles.

현대오토에버는 아이씨티케이(ICTK), 한양대 산학협력단과 공동으로 임베디드 융합 보안 기술을 개발한다고 11일 밝혔다. 자동차, 원격감시제어설비, 의료기기 등 임베디드 환경에서 물리적 복제 방지 기술(PUF) 활용이 핵심이다.

최근 차량이나 스마트TV에 적용된 융합시스템 보안이 중요해지는 반면 이를 해결해 줄 기술이나 솔루션은 거의 없다. 임베디드 융합 보안 기술 개발을 위해 한양대는 PUF 핵심연구를 진행하고 아이씨티케이는 PUF 기반 보안 칩을 개발한다. 현대오토에버는 자동차, 제철, 부품, 금융 등에 특화된 보안기술 응용과 상용화를 맡는다.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.