You are safe with ICTK

We Protect Your Values!

2016 PUF Mass-Produce & SaleDevelopment of IoT security technology using data chips

(서울=연합뉴스) 고현실 기자 = LG CNS가 사물인터넷(IoT) 보안 기기에 데이터 칩을 적용하는 기술 개발에 나섰다.

LG CNS는 보안솔루션 전문업체 ICTK와 이런 내용의 IoT 보안표준기술사업에 관한 양해각서(MOU)를 체결했다고 22일 밝혔다.

LG CNS는 ICTK와 제휴해 물리적복제방지기능(PUF)을 적용한 보안 칩을 IoT 보안관리서버와 기기보안 모듈에 적용할 계획이다.

PUF는 중요 데이터를 메모리 영역에 저장하는 기존 방식과 달리 데이터 자체를 암호화해 칩에 저장한다.

ICTK는 최근 PUF칩 기술을 상용화하는 데 성공했다.

LG CNS는 본격적인 개발에 앞서 PUF칩을 IoT 플랫폼에 접목하는 방안을 검토하고, 연내 인증보안 솔루션 개발을 완료할 계획이다.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.