Root of Trust 



The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage
The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage

Part Number
ICTK RoT IP 
Description 
Silicon Proven Hardware Root of Trust 
Provider 
ICTK Holdings 
Foundry Node
130nm, 110nm, 100nm, 65nm
Maturity
Silicon Proven 
Availibility 
Now