You are safe with ICTK
History



We Protect Your Values!

2013 The Encounter with HY univ.KETI cooperated with ICTK and Hanyang University to develop security chips

전자부품연구원(KETI 원장 김경원)은 30일 아이씨티케이(ICTK 대표 김동현), 한양대 산학협력단(단장 최덕균)과 물리적 복제 불가능 기능(PUF)을 활용한 해킹 방지 보안 칩 개발을 위한 업무 협약을 맺었다고 밝혔다.


<전자부품연구원(KETI)은 30일 아이씨티케이(ICTK), 한양대 산학협력단과 물리적 복제 불가능 기능(PUF)을 활용한 해킹 방지 보안 칩 개발을 위한 업무 협약을 맺었다. 왼쪽부터 김동현 ICTK 대표, 최종찬 KETI 시스템반도체연구본부장, 최덕균 한양대 산학협력단장.>


PUF는 반도체마다 각기 다른 디지털 지문(Digital Fingerprints)에서 생성되는 고유한 키 값을 활용해 개별 칩 위·변조와 복제를 방지하는 기술이다. 현재 사용 중인 소프트웨어 키 기반 보안 방식 보다 강력한 차세대 보안 기술로 평가받는다.


 

To read more:

https://www.etnews.com/201304300407








Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >



We do these things.
PUF Technology



What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.

Resource
  Product

Resource

Product

News