In the course of ” Introduction to Hardware Security “, we will discuss the role of system security function and the operation practice through market application overview and system service cases such as cryptocurrency, mobile payment, secure supply chain. Chapter 6 : Physical Unclonable Function (PUF) 6-1 What is PUF? 6-2 Different kinds of On Chip PUFs 6-3 Applications of PUF #course
Build designs with PUF-based hardware security technology
Here, we provide free IP resources that you can integrate into your designs so you can try out our security solutions.
Use casesView all
Featured ProjectsView all
Advanced Encryption Standard Hardware Cryptographic Engine
June 11, 2020
The AES algorithm is an encryption and decryption algorithm that operates on a block-by-block basis, with an input data block of 128 bits in length, and output data block of 128 bits in length. If the input data is over 128 bits in length, it must be broken up into blocks of 128 bits each. AES is a symmetric block cipher algorithm, meaning the same key is used for both encryption and decryption. This design has been synthesized using Cadence Genus with UMC’s 40nm cell library.
Secure Hash Algorithm 2
June 11, 2020
SHA256 is a cryptographic hash function designed by the United States National Security Agency (NSA) and first published in 2001. Message blocks are 512 bits each and the engine uses 65 rounds to process each message block, returning a digest of 256 bits. This design is synthesized using Cadence Genus with UMC’s 40nm cell library.