- The Unclonable Device Identity That Makes Zero-Trust Devices Possible
From Episode 2: Why Initial Authentication Is Never Enough
In the previous post, we reached a critical conclusion:
Security is not complete with initial authentication alone.
For a Zero-Trust Device to exist, a device—and the software running on it—must be able
to continuously prove that it is genuine, at every moment.
We also identified the foundation of this continuous trust:
Hardware Root of Trust (HRoT) — the anchor where device trust begins.
That leads to one essential question:
What should a Hardware Root of Trust be built on so that its identity cannot be forged, cloned, or stolen?
The technology that answers this question is PUF (Physically Unclonable Function).
This post explains what PUF is, how it works, and why it is essential for Zero-Trust Device Security.

▲ A whiteboard lesson from my first week at ICTK — learning PUF directly from my mentor, Bongho Kang
What Is PUF?
PUF (Physically Unclonable Function) is a hardware security technology that generates a unique and
unclonable device identity using the natural physical variations that occur during semiconductor manufacturing.
Traditional device security typically relies on:
PUF takes a fundamentally different approach.
A PUF does not store identity.
It derives identity from the physical structure of the chip itself—every time it is needed.
This distinction is what makes PUF uniquely suited for Zero-Trust Device architectures.
Why Stored Keys and IDs Fail in Zero-Trust Security
Today, many IoT, automotive, and mobile devices authenticate themselves using:
The problem is simple and fundamental:
Anything that is stored can eventually be extracted.
Even when protected by secure memory, stored secrets remain vulnerable to:
Once a key or ID is exposed, attackers can create perfect device clones with the same identity.
At that point, the Zero-Trust assumption collapses.
How PUF Creates an Unclonable Device Identity
PUF does not rely on algorithms or random numbers.
It derives its identity from the physical properties of the silicon itself.
These include:
microscopic variations in transistor dimensions
inconsistencies in wire length and resistance
natural differences in electrical behavior
These physical variations:
When measured electronically, they produce a unique response pattern—a true hardware fingerprint that belongs to only one chip.
The Six Essential Properties of a True PUF
For a PUF to serve as the identity foundation of an HRoT, it must satisfy all six of the following security properties.

| Property | Meaning |
|---|
| Steadiness | The same chip must produce the same identity across time, temperature, voltage, and aging |
| Randomness | The identity must be unpredictable |
| Uniqueness | Every chip must have a different identity |
| Physically Unclonable | The physical structure cannot be duplicated |
| Mathematically Unclonable | No algorithm or model can reproduce the identity |
| Tamper-Resistance | Physical attacks must not allow identity extraction or reuse |
Only when all six properties are satisfied does a PUF become a true hardware identity—not just a fingerprint, but a Root of Trust.
Why PUF Turns HRoT into a True Root of Trust
Hardware Root of Trust (HRoT) is where a device proves “I am genuine.”
However, if the HRoT relies on stored keys, its trust can eventually be compromised.
With a PUF-based HRoT:
| Traditional Approach | PUF-Based Approach |
|---|
| Stores keys | Stores no keys |
| Identity exists in memory | Identity is generated from physical structure |
| Keys can be stolen | There is nothing to steal |
| Cloning is possible | Physical cloning is impossible |
PUF transforms HRoT from a security function into a physically unforgeable source of trust.
That is why PUF can be described as the missing piece of Zero-Trust Device Security.
Looking Ahead: Not All PUFs Are Equal
So far, we have examined how PUF creates an unclonable device identity.
However, in real products and mass-production environments, not all PUFs meet these six properties equally.
Stability under environmental changes, error rates, and key derivation methods creates significant differences in PUF quality.
In the next post, we will explore:
How PUF implementations differ in real-world deployments, and
How ICTK’s VIA PUF achieves these six properties at an industrial scale.
Summary
Encryption protects data.
HRoT protects device identity.
PUF makes that identity physically and mathematically unclonable.
In the IoT, AI, and quantum era, security no longer starts with stronger algorithms— it starts with trust that cannot be copied.
Read more
#PUF #ZeroTrust #DeviceSecurity #HardwareSecurity #RootofTrust #HRoT #IoTSecurity
- The Unclonable Device Identity That Makes Zero-Trust Devices Possible
From Episode 2: Why Initial Authentication Is Never Enough
In the previous post, we reached a critical conclusion:
Security is not complete with initial authentication alone.
For a Zero-Trust Device to exist, a device—and the software running on it—must be able
to continuously prove that it is genuine, at every moment.
We also identified the foundation of this continuous trust:
Hardware Root of Trust (HRoT) — the anchor where device trust begins.
That leads to one essential question:
What should a Hardware Root of Trust be built on so that its identity cannot be forged, cloned, or stolen?
The technology that answers this question is PUF (Physically Unclonable Function).
This post explains what PUF is, how it works, and why it is essential for Zero-Trust Device Security.
▲ A whiteboard lesson from my first week at ICTK — learning PUF directly from my mentor, Bongho Kang
What Is PUF?
PUF (Physically Unclonable Function) is a hardware security technology that generates a unique and
unclonable device identity using the natural physical variations that occur during semiconductor manufacturing.
Traditional device security typically relies on:
stored cryptographic keys
digital certificates
IDs written into memory
PUF takes a fundamentally different approach.
A PUF does not store identity.
It derives identity from the physical structure of the chip itself—every time it is needed.
This distinction is what makes PUF uniquely suited for Zero-Trust Device architectures.
Why Stored Keys and IDs Fail in Zero-Trust Security
Today, many IoT, automotive, and mobile devices authenticate themselves using:
secret keys stored in Flash, OTP, or secure memory
device certificates
factory-injected IDs
The problem is simple and fundamental:
Anything that is stored can eventually be extracted.
Even when protected by secure memory, stored secrets remain vulnerable to:
Side-channel attacks
Differential power analysis (DPA)
Firmware compromise
Supply-chain attacks
Once a key or ID is exposed, attackers can create perfect device clones with the same identity.
At that point, the Zero-Trust assumption collapses.
How PUF Creates an Unclonable Device Identity
PUF does not rely on algorithms or random numbers.
It derives its identity from the physical properties of the silicon itself.
These include:
microscopic variations in transistor dimensions
inconsistencies in wire length and resistance
natural differences in electrical behavior
These physical variations:
cannot be controlled by design
cannot be predicted
cannot be reproduced
When measured electronically, they produce a unique response pattern—a true hardware fingerprint that belongs to only one chip.
The Six Essential Properties of a True PUF
For a PUF to serve as the identity foundation of an HRoT, it must satisfy all six of the following security properties.
Only when all six properties are satisfied does a PUF become a true hardware identity—not just a fingerprint, but a Root of Trust.
Why PUF Turns HRoT into a True Root of Trust
Hardware Root of Trust (HRoT) is where a device proves “I am genuine.”
However, if the HRoT relies on stored keys, its trust can eventually be compromised.
With a PUF-based HRoT:
PUF transforms HRoT from a security function into a physically unforgeable source of trust.
That is why PUF can be described as the missing piece of Zero-Trust Device Security.
Looking Ahead: Not All PUFs Are Equal
So far, we have examined how PUF creates an unclonable device identity.
However, in real products and mass-production environments, not all PUFs meet these six properties equally.
Stability under environmental changes, error rates, and key derivation methods creates significant differences in PUF quality.
In the next post, we will explore:
How PUF implementations differ in real-world deployments, and
How ICTK’s VIA PUF achieves these six properties at an industrial scale.
Summary
Encryption protects data.
HRoT protects device identity.
PUF makes that identity physically and mathematically unclonable.
In the IoT, AI, and quantum era, security no longer starts with stronger algorithms— it starts with trust that cannot be copied.
Read more
#PUF #ZeroTrust #DeviceSecurity #HardwareSecurity #RootofTrust #HRoT #IoTSecurity