Security IP
Stay secure against evolving threats - with ICTK’s trusted Security IP.
Easy & Quick Integration
• Provided as a customizable Soft IP (RTL) for rapid customer integration.
World-Class Technology
• No need for ECC (Error Correction Code) or additional memory for data compensation.
Compliance with International Standard
(ISO/IEC 20897)
• Meets All Six PUF Implementation Requirements
• Superior stability compared to competitors
High Key Security
• No key injection required - each device generates its own unique key.
Standard CMOS Process
• No additional process steps required for PUF implementation.
Security IP
Stay secure against evolving threats - with ICTK’s trusted Security IP.
vPUF (Basic / Elite)
Cryptographic Algorithm IP
ICTK’s cryptographic algorithms are optimized for diverse customer environments, ensuring complete compliance with the three pillars of security - confidentiality, integrity, and availability.
AES(Advanced Encryption Standard)
[Application]
Data Storage, Network Communication(TLS, VPN)
ECC(Elliptic Curve Cryptography)
[Application ]
Integrity, Authentication,
Non-repudiation
HMAC(Hash-based Message Authentication Code)
[Application ]
Integrity, Authentication
vPUF
vPUF is ICTK’s proprietary VIA PUF™ technology IP, which assigns an inherent, unclonable unique ID to each semiconductor chip.
By applying the six core characteristics of PUF across various customer environments, it provides the core functionality of a hardware-based Root of Trust (RoT).
In particular, the keys generated by VIA PUF™ are created directly within the chip without external storage, fundamentally eliminating the risk of key leakage, forgery, or duplication, thereby delivering a revolutionary enhancement in security.
Easy & Quick Integration • Provided as a customizable Soft IP (RTL) for rapid customer integration. |
Standard CMOS Process
• No additional process steps required for PUF implementation. |
Compliance with International Standard (ISO/IEC 20897) • Meets All Six PUF Implementation Requirements |
World-Class Technology • No need for ECC(Error Correction Code) or additional memory for data compensation. |
High Key Security • No key injection required - each device generates its own unique key. |
Strong Key-Based Security Principle • Supports generation of up to 4 billion unique keys through PUF Key and KDF. (*KDF: Key Derivation Function) |
vPUF (Basic / Elite)
Name | vPUF Basic | vPUF Elite |
Applications | • Secure Key Storage • Private Key Generation (Based on public-key cryptographic algorithms) • Intrinsic Device ID • Trusted Supply Chain • Anti-Tampering Protection | • All Basic Functions • Symmetric Key Generation • Security Parameter Generation |
AES(Advanced Encryption Standard)
AES(Advanced Encryption Standard) is the world’s most widely used symmetric block cipher.
It delivers high speed and strong security compared to other symmetric or asymmetric algorithms, making it ideal for performance-critical applications.
Key Applications
Data Storage |
Network Communication (TLS, VPN) |
ECC(Elliptic Curve Cryptography)
ECC (Elliptic Curve Cryptography), one of the leading public-key algorithms, achieves equal or higher levels of security than RSA and other traditional methods, with much smaller key sizes — offering both efficiency and robustness in modern cryptographic systems.
Key Applications
Integrity |
Authentication |
Non-repudiation |
HMAC(Hash-based Message Authentication Code)
HMAC is a type of Message Authentication Code (MAC) that combines a hash function with a secret key to verify message integrity and authenticity. It ensures that the message has not been tampered with or altered during transmission, providing a reliable way to confirm both data integrity and origin authentication.
Key Applications
Integrity |
Authentication |
Copyright ⓒ 2025 ICTK.com. All Rights Reserved.
16, Gangnam-daero 84-gil, Gangnam-gu, Seoul, Republic of Korea (06241)
+82.2.569.0010