Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Sentinel
  4. Physically Unclonable Functions

Physically Unclonable Functions

Hardware-based cryptographic keys derived from unique manufacturing variations in semiconductor chips
Back to SentinelView interactive version

Physically Unclonable Functions represent a fundamental shift in how cryptographic security is implemented at the hardware level. Unlike traditional security approaches that rely on storing secret keys in memory—where they remain vulnerable to extraction through various attack vectors—PUFs exploit the inherent randomness that occurs during semiconductor fabrication. At the nanoscale, manufacturing processes introduce minute variations in transistor threshold voltages, wire delays, and other physical properties that are impossible to control precisely. These variations, while typically considered manufacturing imperfections, create a unique physical signature for each chip that can be measured and converted into cryptographic material. When a challenge is presented to a PUF circuit, it produces a response based on these physical characteristics, generating keys on-demand rather than storing them. This challenge-response mechanism means the secret never exists in a form that can be directly read from memory, fundamentally changing the security paradigm from "hiding secrets" to "deriving secrets from physics."

The technology addresses critical vulnerabilities in supply chains and device authentication that have plagued the semiconductor industry for decades. Counterfeit electronics represent a multi-billion dollar problem, with fake components infiltrating everything from consumer devices to critical infrastructure and military systems. Traditional authentication methods that rely on stored credentials can be cloned or extracted, but the physical randomness underlying PUFs cannot be duplicated even by the original manufacturer. This makes PUFs particularly valuable for establishing hardware roots of trust—the foundational layer upon which all other security measures depend. In Internet of Things deployments, where billions of resource-constrained devices require authentication, PUFs offer a lightweight alternative to traditional cryptographic key storage that doesn't require dedicated secure memory or battery-backed storage. The technology also enables new business models around secure licensing and feature activation, allowing manufacturers to differentiate products through cryptographically-enforced capabilities rather than physical component changes.

Research institutions and semiconductor manufacturers have been developing various PUF architectures for over two decades, with several implementations now reaching commercial maturity. SRAM PUFs, which derive keys from the random startup states of memory cells, have been integrated into microcontrollers and secure elements used in payment cards and identity documents. Ring oscillator PUFs and arbiter PUFs represent alternative designs optimised for different performance and security trade-offs. Early deployments indicate particular promise in securing firmware updates for embedded systems, where verifying device authenticity before accepting code is critical. The technology is also being explored for blockchain applications, where PUFs could provide tamper-evident hardware wallets, and in edge computing scenarios requiring distributed trust without centralised key management infrastructure. As semiconductor geometries continue to shrink and manufacturing variations become more pronounced, PUFs are positioned to become an increasingly important component of hardware security architectures, particularly as quantum computing threatens traditional cryptographic approaches and the need for post-quantum security solutions intensifies across industries.

TRL
7/9Operational
Impact
4/5
Investment
3/5
Category
Hardware

Related Organizations

Intrinsic ID

Netherlands · Company

99%

A spinout from Philips, they are the leaders in SRAM PUF technology.

Developer
PUFsecurity logo
PUFsecurity

Taiwan · Startup

98%

A subsidiary of eMemory, focusing on PUF-based security IP solutions.

Developer
ICTK logo
ICTK

South Korea · Company

95%

South Korean fabless company specializing in VIA PUF technology.

Developer
eMemory Technology logo
eMemory Technology

Taiwan · Company

90%

Logic non-volatile memory (NVM) IP provider.

Developer
NXP Semiconductors logo
NXP Semiconductors

Netherlands · Company

90%

Leading manufacturer of Near Field Communication (NFC) and Secure Element chips used in offline payment hardware.

Deployer
Synopsys logo
Synopsys

United States · Company

90%

Developing Electronic Design Automation (EDA) tools specifically for superconducting electronics.

Acquirer
Microchip Technology logo
Microchip Technology

United States · Company

88%

Developer of BodyCom technology, which uses the human body as a secure communication channel via electric fields.

Deployer
Lattice Semiconductor logo
Lattice Semiconductor

United States · Company

85%

A leader in low-power FPGAs, offering the sensAI stack for implementing NPUs on reconfigurable hardware.

Deployer
Silicon Labs logo
Silicon Labs

United States · Company

85%

Semiconductor company providing BG24 SoCs with hardware acceleration for Bluetooth distance measurement.

Deployer
Sandia National Laboratories logo
Sandia National Laboratories

United States · Research Lab

80%

A US Department of Energy lab actively researching adiabatic logic circuits and reversible computing to overcome thermodynamic limits in microelectronics.

Researcher

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

Hardware
Hardware
FIDO Security Keys

Hardware authenticators using cryptographic keys for phishing-resistant passwordless login

TRL
9/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Quantum Random Number Generators

Hardware generating unpredictable randomness from quantum phenomena for cryptographic security

TRL
6/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Trusted Platform Modules

Hardware chips that anchor device identity and protect cryptographic keys from tampering

TRL
9/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Hardware Security Modules

Tamper-resistant hardware that protects cryptographic keys and performs secure signing operations

TRL
9/9
Impact
5/5
Investment
5/5
Hardware
Hardware
Secure Elements & eSIMs

Tamper-resistant chips that isolate and protect cryptographic keys and digital credentials

TRL
9/9
Impact
4/5
Investment
4/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions