The latest version of CPK (v6. 0) isrealized on chip. The CPK-chip carries CPK-cryptosystem to a newstage of development. The chip not only has the function ofsignature and verification, but also has the function of encryptionand decryption without any outside support. CPK can solve the hardproblem of scaled identity authentication, minimizing the threat ofattack ( cloud computing, quantum computing and collusion). CPK canadvance the authentication logic from \belief logic\ and \trustlogic\ to \truth logic\. The truth logic is the foundation ofconstructing authenticated (trus ted) connecting, computing,transaction, logistics, counter - forgery, and so on. Readersbenefited from this book will be researchers and professors,experts and students, engi neers and policy makers, and all otherswho are interested in cyber security.