You are safe with ICTK

We Protect Your Values!

2016 PUF Mass-Produce & SaleLGCNS-ICTK signed an MOU for the security standard technology business. Enhance IoT security.

▲ LG CNS는 아이씨티케이와 IoT 보안표준기술사업을 위한 양해각서를 체결했다. (왼쪽부터 아이씨티케이 김동현 대표, LG CNS IoT사업담당 조인행 상무) (자료: LG CNS)


LG CNS가 IoT 국제표준 인증을 획득한데 이어 IoT 보안 강화에 나섰다.

LG CNS는 최근 서울 여의도 LG CNS 본사에서 보안솔루션 전문업체 (주)아이씨티케이(ICTK)와 IoT 보안표준기술사업(PUF) 양해각서(MOU)를 체결했다.


LG CNS는 이번 전략적 제휴를 통해 IoT 보안관리서버 및 기기보안모듈에 PUF칩을 적용하는 연동 개발에 착수한다.

PUF(Physical Unclonable Function) 기술은 유럽, 미국 등 선진국에서 이미 인정받고 있는 보안 표준 기술로, 중요 데이터를 메모리 영역에 저장하는 기존 방식과 달리 Key값과 같은 중요데이터 자체를 암호화함으로써 보안 취약점을 근본적으로 해결한다.


LG CNS IoT사업담당 조인행 상무는 “최근 사물인터넷이 확산되면서 보안에 대한 우려가 증가하고 있다”며, “PUF칩 기술은 하드웨어 기반의 강력한 보안이란 점에서 LG CNS의 IoT플랫폼과 시너지를 발휘해 IoT시장을 선도하는 역할을 수행할 것”이라고 말했다.


To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.