The G30 is an ICTK’s PUF based-security chip that performs authentication and cryptography operations. It is suited for performing secure authentication, protecting firmware, preventing counterfeiting, and storing secure data.With ICTK’s PUF technology, the G30 can generate more secure and reliable crypto key.
Features:
PUF:
- The PUF supports key generation.
- The data stored in G30 is encrypted using a PUF key and it is decrypted when using the data.
- The private key of ECC is generated by PUF and a key received from external site can be used.
- When using AES and SM4 algorithms, a PUF key supports encryption and decryption.
Function:
- The application uses the 15.1 Kbytes of flash memory.
- The G30 supports cryptographic algorithms:
- Symmetric key algorithm: AES and SM4
- Asymmetric key algorithm:
- ECC (ECDSA and ECDH) with secp256r1 (NIST P256)
- ECC sm2p256 curve and SM2 signature algorithm
- Hash algorithm: SHA256, SM3
- TLS1.2
Operating Voltage:
Interface:
Power Consumption:
- Sleep : < 1 uA
- Idle : 1 mA
- Normal : 10mA
Package: