- 100G AES Encryption Core
- 3DES Crypto Engine
- 3DES-ECB 1 Billion trace DPA resistant cryptographic accelerator core
- Active mesh against tampering attacks - Active Shield
- AES (ECB), 1 Billion Trace DPA Resistant Cryptographic Accelerator Cores
- AES (ECB-CBC-CFB-CTR), 1 Billion Trace DPA Resistant Cryptographic Accelerator Cores
- More Products...
IP-SOC DAYS 2025 IP-SOC DAYS 2024 IP-SOC DAYS 2023 IP-SOC DAYS 2022 IP-SOC DAYS 2021 IP-SOC 2024 IP-SOC 2023 IP-SOC 2022 IP-SOC 2021
|
|||||||
![]() |
|

The Key to IoT Security in Smart Homes
- AI vs. AI: Both Friend and Foe in Cybersecurity
- BrainChip Collaborates with Chelpis-Mirle on Security Solution
- Crypto Quantique announces QRoot Lite - a lightweight and configurable root-of-trust IP for resource-constrained IoT devices
- PQShield launches UltraPQ-Suite for deeply specialized implementations of post-quantum cryptography
- Crypto Quantique publishes independent cetome analysis on streamlining CRA compliance with the QuarkLink security platform
- Perforce Partners with Siemens for Software-Defined, AI-Powered, Silicon-Enabled Design (May. 16, 2025)
- Semidynamics: From RISC-V with AI to AI with RISC-V (May. 16, 2025)
- TSMC Board of Directors Meeting Resolutions (May. 16, 2025)
- Arm Evolves Compute Platform Naming for the AI Era (May. 16, 2025)
- Secafy Licenses Menta's eFPGA IP to Power Chiplet-Based Secure Semiconductor Designs (May. 15, 2025)
- See Latest News>>
Addressing security concerns in an increasingly connected world.
www.eetasia.com/, Mar. 14, 2023 –
When everything is connected, everything is at risk. The proliferation of internet of things (IoT) devices for smart homes has raised security and privacy concerns to their users. By implementing a hardware root of trust, the authenticity, integrity and confidentiality of devices are enforced, and smart homes are protected against would-be attackers.
Security in IoT should never be an afterthought. Over the years, attacks have become more frequent, sophisticated, devious and targeted. From the voice assistant to the baby monitor to the smart-heating system, billions of smart-home devices are now vulnerable to endpoint intrusions.
To establish a foundation of trust, IoT device makers need to get identities and keys into their devices and keep these assets secure. Intrinsic ID, a spinout of Royal Philips Electronics, has developed IP solutions based on physical unclonable functions (PUFs) to secure connected devices.
Securing trust
With the explosion of connected IoT devices per household, it has become critical to ensure data security and privacy preservation. Every device potentially represents an entry point for malicious intrusion, from the device itself to the network it is connected to.
A hardware root of trust is the foundation for protecting smart-home endpoints and services. It establishes an anchor point for the chain of trust by creating a unique, immutable and unclonable identity to authorize a device in the IoT network.
For many years, PUFs have been deployed as a hardware root of trust. A PUF is a physical structure from which a device-unique and unclonable cryptographic key is created. It leverages the deep submicron variations that occur naturally during the chip-manufacturing process and gives each transistor slightly random electrical properties.
There are different ways to use a PUF to secure a device. Eindhoven, Netherlands-based Intrinsic ID has built a foundation of trust based on static random-access memory (SRAM) PUFs.