![]() | The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used. |
![]() | ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC |
![]() | RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage |
![]() | The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used. |
![]() | ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC |
![]() | RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage |
Part Number | ICTK RoT IP |
Description | Silicon Proven Hardware Root of Trust |
Provider | ICTK Holdings |
Foundry Node | 130nm, 110nm, 100nm, 65nm |
Maturity | Silicon Proven |
Availibility | Now |
About us | PUF Technology | Product | Resource | Contact Us | Investment | Careers |
What is Hardware Root of Trust (HRoT)? |