You are here : design-reuse-embedded.com  > Security Solutions  > Other
Download Datasheet        Request More Info


Quiddikey is a secure key management solution that dynamically reconstructs on-chip secret keys without ever storing those keys. This means that the keys are not present on the device when it is powered off, but generated only when needed on-the-fly using device-dependent Physically Unclonable Functions (PUFs). This technology used to do this is called Hardware Intrinsic Security (HIS) and makes use of the unique device fingerprint originating from deep sub-micron manufacturing process variations. It defeats the most advanced invasive hardware attacks on the key itself by simply not storing the key. Its flexible key management is designed to enable storage of multiple cryptographic keys of various lengths.


  • Superior anti-tamper and anti-cloning protection based on Hardware Intrinsic Security
  • Uses only a small block of standard SRAM - applicable in all process nodes
  • No need for non-volatile memory to store keys
  • Easy and fast implementation in HW - pure digital logic to integrate - no tuning needed for special circuitry
  • Fast-track implementations in SW version (runs on embedded CPU) or in FPGA-based devices (e.g. Microsemi SmartFusion)
  • Cost efficient - small silicon area and/or SW footprint
  • Robust and reliable technology, exhaustively tested for the most extreme operating conditions
  • Requires only 44k gates


  • Hardware root-of-trust
  • Authentication
  • Secure Boot
  • Secure Element
  • Content Protection
  • Sensitive government applications
  • Mobile
  • Internet of things (IoT)

Block Diagram

Tech Specs

Maturity Silicon proven


  • Secure key programming without requiring secure non-volatile memory on the target device
  • Supporting key lengths up to 256 bit symmetric, 512 bit ECC and 4096 bit RSA
  • Invasively reading out a memory will not reveal information about the key
  • Tampering with the memory will not reveal the key
  • Flexible and dynamic key programming of multiple, cryptographically separated keys
  • Anti-cloning: copying the activation code, key codes and software to another device results in a non-functional device
  • Keys are extracted from a device s hardware fingerprint
  • No key present at power-off in the system


  • RTL silicon IP
  • Software (run as executable code on an embedded CPU)
  • FPGA that can be integrated seamlessly into any chip design
  • Documentation

Partner with us

Visit our new Partnership Portal for more information.

Submit your material

Submit hot news, product or article.

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2018 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted,
reposted, duplicated or otherwise used without the
express written permission of Design And Reuse.