Blog


Exploring the future of security — From Hardware Root of Trust to End-to-End Quantum-Safe Protection.


[PUF & Hardware Root of Trust]Why PUF Is the Missing Piece of Zero-Trust Device Security

ICTK
15 Jan 2026

- The Unclonable Device Identity That Makes Zero-Trust Devices Possible 


From Episode 2: Why Initial Authentication Is Never Enough

In the previous post, we reached a critical conclusion:

Security is not complete with initial authentication alone.

For a Zero-Trust Device to exist, a device—and the software running on it—must be able

 to continuously prove that it is genuine, at every moment.

We also identified the foundation of this continuous trust:

Hardware Root of Trust (HRoT) — the anchor where device trust begins.


That leads to one essential question:

What should a Hardware Root of Trust be built on so that its identity cannot be forged, cloned, or stolen?


The technology that answers this question is PUF (Physically Unclonable Function).

This post explains what PUF is, how it works, and why it is essential for Zero-Trust Device Security.

c4b472c7b4364.jpg

▲ A whiteboard lesson from my first week at ICTK — learning PUF directly from my mentor, Bongho Kang


What Is PUF?


PUF (Physically Unclonable Function) is a hardware security technology that generates a unique and

unclonable device identity using the natural physical variations that occur during semiconductor manufacturing.

Traditional device security typically relies on:

  • stored cryptographic keys

  • digital certificates

  • IDs written into memory

PUF takes a fundamentally different approach.


A PUF does not store identity.

It derives identity from the physical structure of the chip itself—every time it is needed.

This distinction is what makes PUF uniquely suited for Zero-Trust Device architectures.


Why Stored Keys and IDs Fail in Zero-Trust Security


Today, many IoT, automotive, and mobile devices authenticate themselves using:

  • secret keys stored in Flash, OTP, or secure memory

  • device certificates

  • factory-injected IDs

The problem is simple and fundamental:

Anything that is stored can eventually be extracted.


Even when protected by secure memory, stored secrets remain vulnerable to:

  • Side-channel attacks

  • Differential power analysis (DPA)

  • Firmware compromise

  • Supply-chain attacks

Once a key or ID is exposed, attackers can create perfect device clones with the same identity.

At that point, the Zero-Trust assumption collapses.


How PUF Creates an Unclonable Device Identity


PUF does not rely on algorithms or random numbers.

It derives its identity from the physical properties of the silicon itself.

These include:

  • microscopic variations in transistor dimensions

  • inconsistencies in wire length and resistance

  • natural differences in electrical behavior

These physical variations:

  • cannot be controlled by design

  • cannot be predicted

  • cannot be reproduced

When measured electronically, they produce a unique response pattern—a true hardware fingerprint that belongs to only one chip.


The Six Essential Properties of a True PUF


For a PUF to serve as the identity foundation of an HRoT, it must satisfy all six of the following security properties.

d8634b89d1da7.png

PropertyMeaning
SteadinessThe same chip must produce the same identity across time, temperature, voltage, and aging
RandomnessThe identity must be unpredictable
UniquenessEvery chip must have a different identity
Physically UnclonableThe physical structure cannot be duplicated
Mathematically UnclonableNo algorithm or model can reproduce the identity
Tamper-ResistancePhysical attacks must not allow identity extraction or reuse


Only when all six properties are satisfied does a PUF become a true hardware identity—not just a fingerprint, but a Root of Trust.


Why PUF Turns HRoT into a True Root of Trust


Hardware Root of Trust (HRoT) is where a device proves “I am genuine.”

However, if the HRoT relies on stored keys, its trust can eventually be compromised.

With a PUF-based HRoT:

Traditional ApproachPUF-Based Approach
Stores keysStores no keys
Identity exists in memoryIdentity is generated from physical structure
Keys can be stolenThere is nothing to steal
Cloning is possiblePhysical cloning is impossible


PUF transforms HRoT from a security function into a physically unforgeable source of trust.

That is why PUF can be described as the missing piece of Zero-Trust Device Security.


Looking Ahead: Not All PUFs Are Equal


So far, we have examined how PUF creates an unclonable device identity.

However, in real products and mass-production environments, not all PUFs meet these six properties equally.

Stability under environmental changes, error rates, and key derivation methods creates significant differences in PUF quality.

In the next post, we will explore:

  • How PUF implementations differ in real-world deployments, and

  • How ICTK’s VIA PUF achieves these six properties at an industrial scale.

Summary

  • Encryption protects data.

  • HRoT protects device identity.

  • PUF makes that identity physically and mathematically unclonable.

In the IoT, AI, and quantum era, security no longer starts with stronger algorithms— it starts with trust that cannot be copied.


Read more


#PUF #ZeroTrust #DeviceSecurity #HardwareSecurity #RootofTrust #HRoT #IoTSecurity







Copyright ⓒ 2025 ICTK.com. All Rights Reserved.

16, Gangnam-daero 84-gil, Gangnam-gu, Seoul, Republic of Korea (06241)

+82.2.569.0010