VIA PUF™

Physically Unclonable Function

From Start to Finish

- Security Perfected by PUF!

ICTK’s proprietary VIA PUF™ ensures ultimate key protection, making Quantum Security truly flawless.

What is PUF?


PUF (Physically Unclonable Function) creates a unique, unclonable identity within each chip — forming the hardware root of trust that enables truly secure systems.

It refers to a hardware security technology that must comply with the international standard ISO/IEC 20897.

VIA PUF™


From Start to Finish - Security Perfected by PUF!

ICTK’s proprietary VIA PUF™ ensures ultimate key protection, making Quantum Security truly flawless.

The Global Standard for PUF Technology - ISO/IEC 20897


Ensuring the security, stability, and reliability of hardware-based trust.

Why VIA PUF™?


Built on microscopic via-hole variations,

ICTK’s exclusive PUF technology establishes a next-generation HRoT — resilient even to AI, quantum, and side-channel attacks.

Quantum Security Integration

AI Threat Response

Side-Channel Attack Protection

De Facto Standard for Trust

Unmatched Stability

Structure of VIA PUF Security Chip

VIA PUF Products

What is PUF (Physically Unclonable Function)?


PUF (Physically Unclonable Function) creates a unique, unclonable identity within each chip

- forming the hardware root of trust that enables truly secure systems.

It refers to a hardware security technology that must comply with the international standard ISO/IEC 20897.


The Global Standard for PUF Technology - ISO/IEC 20897 


Ensuring the security, stability, and reliability of hardware-based trust.

Why VIA PUF™?


Built on microscopic via-hole variations, ICTK’s exclusive PUF technology establishes a next-generation HRoT

- resilient even to AI, quantum, and side-channel attacks.



Quantum Threat Response 


Dual-Layer Security System – Quantum HRoT
Combines VIA PUF Key (Physical ID) with PQC algorithms to deliver a quantum-secure HRoT through:

  • Non-linearity at the seed level
  • Secure PQC key storage
  • Compatibility with classic asymmetric keys
  • High-speed performance with crypto accelerators



AI Threat Response 



Randomized Non-linear Response Structure
Blocks AI/ML-based modeling attacks by leveraging physical randomness, creating an unpredictable response space that resists emerging AI-driven PUF predictor attacks.







Side-Channel Attack Protection 


Randomized Noise Shaping inside the PUF security chip masks power and current waveforms, blocking DPA (Differential Power Analysis) and SPA (Simple Power Analysis) attacks.
Also includes EM emission shielding, achieving full hardware-level side-channel hardening.






De Facto Standard for Trust 


Recognized by the Global Semiconductor Alliance (GSA) as a main reference for HRoT architecture.
ICTK’s PUF HRoT aligns with global standards such as GSA, ISO/IEC 20897, and NIST SP 800-193 frameworks.







Unmatched Stability 


Maintains stable PUF keys (IDs) under PVT variations (Process, Voltage, Temperature) and aging.

  • No need for ECC (Error Correction Code)

  • Low power, high reliability

  • 100% key reproducibility for over 10 years

  • Proven through automotive and silicon-based security module deployments


Flexible Design 


Foundry node–independent architecture

  • No redesign required for porting

  • Applicable across 28nm to 5nm processes

  • Compatible with ASIC, SoC, discrete chip, and IP forms

  • Supports custom SoC design and PUF silicon IP-based security solutions

Structure of VIA PUF Security Chip

Key Applications

IoT & smart devices

Data Center &

Cloud Services

Finance & Payment

Consumer Electronics

Automotive &

Autonomous Driving

Industry & Logistics

Defense & Public Sector

Mobile & Network

VIA PUF Products






Copyright ⓒ 2025 ICTK.com. All Rights Reserved.

16, Gangnam-daero 84-gil, Gangnam-gu, Seoul, Republic of Korea (06241)

+82.2.569.0010