PUF Tech
PUF is a cutting-edge technology that creates a unique security key during the chip manufacturing process, at the micro-level.
This key is impossible to modify or duplicate.

PUF Tech
PUF is a cutting-edge technology that creates a unique security key during the chip manufacturing process, at the micro-level.
This key is impossible to modify or duplicate.
PUF Tech
Physically Unclonable Function(PUF) is a cutting-edge technology that assigns a unique security key to each semiconductor chip by utilizing minute variations in the physical structure that occur during the chip manufacturing process, making it impossible to tamper with or duplicate.
Product
All ICTK's products are based on PUF chips with strong security features. They are also available in modular form to meet the needs of different customer environments and conditions. Ultimately, these chips and modules can be supported as a comprehensive security solutions and IP.
Chips
Roots of trust are highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. As such, many roots of trust are implemented in hardware so that malware cannot tamper with the functions they provide. Roots of trust provide a firm foundation from which to build security and trust.
Modules
PUF chips can be molded into modules of the customer's choice. It can be shaped and molded to be more user-friendly, but its security features are much stronger. Currently, the main module lineup includes Wi-Fi modules, LTE/5G modules, Secure UICC, and Secure USB/PCI modules.
Solutions
The chips and modules come together and are finally delivered to customers as a solution. ICTK's security solutions are already in use in the market in various fields such as user authentication, FOTA, KMS, PQC, and VPN.
IP
It is the basis of the ICTK Root of Trust System and is mainly provided with other Security Elements. It is not IP in the form of hard macro of other companies like SRAM PUF, but soft IP provided in RTL. Flexible integration into any SoC configuration. The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification.
Resources
ICTK's technologies and products are very specialized and require considerable technical knowledge to handle. Therefore, ICTK provides various kits and datasheets to respond to various needs of customers. The articles and papers we provide will also help you understand and utilize ICTK's tech. and products.
Paper
These are the latest papers from ICTK's top tier staffs, which should give you an idea of the technical orientation of ICTK. Join us and keep up with the latest technology trends related to PUF and security.
Our Products
Based on security chips embedded with VIA PUF technology, a wide range of products, solutions, customizable modules, and IPs can be supported.
Chips
By implementing a hardware-based Root of Trust (HRoT) using a PUF security chip, enhanced security is ensured from the product design stage. To address the growing security threats posed by quantum computing, we offer advanced PUF security chips combined with Post-Quantum Cryptography (PQC).
Modules
PUF chips can be customized into modules—such as unclonable PQC-PUF SIM chips—according to customer environments and requirements, providing even stronger security.
Solutions
Our chips and modules come together and are finally delivered to clients as a solution. ICTK's security solutions are already in use in the market in across various fields such as user authentication, FOTA, KMS, PQC, and VPN.
IP
It is the basis of the ICTK Root of Trust System and is mainly provided with other Security Elements. Flexible integration into any SoC configuration. The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification.
Resources
To help customers better understand ICTK’s specialized technologies and products, we provide evaluation kits, datasheets, and academic and research papers.
![]() Papers These are the latest papers by ICTK’s top-tier staff, which should give you an idea of the technical breadth and orientation of our company. Join us and keep up with the latest trends related to PUF and security. |