Codasip approached Verilock to implement multiple security functions such as device authentication, firmware signing, original content provenance, and one-time pad encryption based on its patented Entropy Extraction Device (EED) technology. The technology is built on advanced research leveraging chaotic networks for a novel and virtually unbreakable authentication solution.
Many different industry sectors such as autonomous cars, Industry 4.0, privacy protection, and the IoT all have high-security requirements. From device authentication to over-the-air software updates and secure boot, data encryption based on random cryptographic key generation has become a necessity. However, these innovations also come with threats and vulnerabilities, while ML/AI and quantum computers have opened the door to malicious behaviours including side-channel attacks.
Brett Cline, chief commercial officer at Codasip, commented, “The semiconductor industry needs authentication solutions infused into the hardware. We also need this technology to be sophisticated enough to stay a step ahead of the bad actors. This is exactly what the team at Verilock has developed. Through our collaboration, we can provide a unique, future-proof, and flexible approach.”
Verilock was founded in 2021 to commercialise pioneering work between Ohio State University and Potomac Research LLC in the field of dynamical chaotic networks. The company provides, what is said to be, a virtually unbreakable authentication solution based on Entropy Extraction Device (EED) technology.
Jim Northup, chief executive officer at Verilock, said: “Current security solutions with hardware at their root have one or a handful of root keys or identifiers. This can be compromised by a motivated adversary using physical or machine learning-driven side-channel attacks. We have reinvented hardware authentication by leveraging chaotic networks. The result is truly quantum-safe systems with new possibilities for flexible and custom implementation. It’s a perfect fit with Codasip’s Custom Compute approach.”