editor's blog
Subscribe Now

IntrinsicID and InsideSecure Come to DropBox

We’ve taken an occasional look at physically-unclonable functions (PUFs), and, in particular, IntrinsicID’s implementation of them, as they seem to have gone further in productizing their technologies than others have. As we’ve noted before, PUFs rely on intrinsic physical variation from chip to chip. While this variation may drive IC designers and EDA guys nuts, it’s leveraged in PUFs so that a unique key can be created for each individual machine or USB dongle. The key is never stored, so it’s much much harder for some ne’er-do-well to crack.

As we’ve also noted before, IntrinsicID launched a security facility called Saturnus for protecting cloud contents. They have now integrated their PUF technology with InsideSecure’s secure microcontrollers to create USB keys. Combined with Saturnus, they now work with DropBox: Selected files, when uploaded, will be encrypted first. They cannot be decrypted without the key that’s on the USB stick. Wait, no, it’s not literally on the stick – it’s generated on the stick. That’s what makes this work; the key is generated each time it’s used.

As far as I can tell, this is the furthest PUF technology has gone, at least in the white-project commercial world. (Who knows how it’s being used in black projects…) By integrating itself into an accepted consumer application like DropBox, it becomes relevant to a broad range of user.

For more on the InsideSecure collaboration, check out that release. The DropBox facility is described in this release.

Leave a Reply

featured blogs
Jun 12, 2025
We truly do live in a world that would have been considered to be a far-flung science fiction future only a few short decades ago...

featured paper

Shift Left with Calibre Pattern Matching: Trust in design practices but verify early and frequently

Sponsored by Siemens Digital Industries Software

As integrated circuit (IC) designs become increasingly complex, early-stage verification is crucial to ensure productivity and quality in design processes. The "shift left" verification approach, enabled by Siemens’ Calibre nmPlatform, helps IC design teams to identify and resolve critical issues much earlier in the design cycle.

Click to read more

featured chalk talk

STM32 Security for IoT
Today’s modern embedded systems face a range of security risks that can stem from a variety of different sources including insecure communication protocols, hardware vulnerabilities, and physical tampering. In this episode of Chalk Talk, Amelia Dalton and Thierry Crespo from STMicroelectronics explore the biggest security challenges facing embedded designers today, the benefits of the STM32 Trust platform, and why the STM32Trust TEE Secure Manager is an IoT security game changer.
Aug 20, 2024
39,949 views