Technology ,excellent quality and mature
Mature Technology, Excellent Quality
China's leading chip fingerprint encryption technology provides security for you
Product Programme
Product
China's leading chip fingerprint encryption technology provides security for you
G30 - Video Encryption
Product Description

The G30 is an ICTK’s PUF based-security chip that performs authentication and cryptography operations. It is suited for performing secure authentication, protecting firmware, preventing counterfeiting, and storing secure data.With ICTK’s PUF technology, the G30 can generate more secure and reliable crypto key.
Features:
PUF:

  • The PUF supports key generation.
  • The data stored in G30 is encrypted using a PUF key and it is decrypted when using the data.
  • The private key of ECC is generated by PUF and a key received from external site can be used.
  • When using AES and SM4 algorithms, a PUF key supports encryption and decryption.

Function:

  • The application uses the 15.1 Kbytes of flash memory.
  • The G30 supports cryptographic algorithms:
  • Symmetric key algorithm: AES and SM4
  • Asymmetric key algorithm:
  • ECC (ECDSA and ECDH) with secp256r1 (NIST P256)
  • ECC sm2p256 curve and SM2 signature algorithm
  • Hash algorithm: SHA256, SM3
  • TLS1.2

Operating Voltage:

  • VDD : 1.65~3.6 V

Interface:

  •  SPI

Power Consumption:

  •  Sleep : < 1 uA
  •  Idle : 1 mA
  •  Normal : 10mA

Package:

  •  8-pin uDFN
Product Application
    • Video data encryption.  
    • IoT terminal node authentication
    • Firmware protection
    • Secure boot