You are safe with ICTK

We Protect Your Values!

2020 PUF meets QuantumDevelopment cooperation between Pax Data Tech and ICTK for the 3rd generation blockchain

(서울=연합뉴스) 채새롬 기자 = 블록체인 기술업체 팍스데이터테크와 보안솔루션업체 ICTK는 17일 서울 쉐라톤 팔래스 호텔에서 기자간담회를 열고 '퓨어체인' 기술을 활용한 제3세대 블록체인 플랫폼을 개발하는데 협력하기로 했다고 밝혔다.

ICTK가 카이스트, 경희대 연구진 등과 개발한 'PUF'(물리적 복제 방지 기능) 기반의 블록체인 기술인 '퓨어체인'은 제3자 개입 없이 거래 당사자 노드간 합의만으로 실시간 거래가 가능해 처리 속도가 빠르고 보안성도 유지된다는 것이 회사측 설명이다.

팍스데이터테크 최영규 대표는 "비트코인, 이더리움의 취약점을 개선한 제3세대 컬러플랫폼을 개발 중"이라며 "PUF라는 하드웨어 기반 기술을 도입해 블록체인 다음 시대를 열고자 한다"고 말했다.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.