
FPGA cores feature strong DPA countermeasures for cryptography
DPA and differential electromagnetic analysis (DEMA) are types of SCA that involve monitoring variations in the electrical power consumption or electromagnetic emissions from a target device, respectively. DPA and DEMA attacks are non-invasive, easily automated and can be mounted without knowing the design of the target device. Unlike invasive tampering, electromagnetic attacks can even be performed at a distance. As an example, electromagnetic attacks on cell phones have been demonstrated at a range of 30 feet. DPA and DEMA countermeasures are essential to protect devices that use cryptographic keys, especially sensitive defense applications that require strong anti-tamper protection of advanced electronics and commercial devices that perform high-value processing, including mobile devices and Internet of Things (IoT) endpoints.
"DPA countermeasures are critical to any tamper-resistant system," said Paul Quintana, director of vertical marketing, Microsemi Defense, Security and Computing. "As threat vectors increase in sophistication, so must the security solutions. Microsemi customers are looking for the most robust and proven anti-tamper and information assurance capabilities for their products. Athena is now delivering its best-of-breed family of silicon-proven security products as soft IP for license on the industry’s only DPA-resistant FPGAs certified by Rambus Cryptography Research, SmartFusion2 and IGLOO2."
Athena’s robust, innovative DPA countermeasure systems deliver resistance to side channel monitoring attacks across a broad range of standard cryptographic algorithms and performance levels used for embedded applications in markets including defense, communications and industrial. These silicon-proven cores have been recently enhanced to resist SCA/DPA attacks up to 1 billion traces and can be optimized for size, speed and security level based on customer requirements. Furthermore, since select SmartFusion2 and IGLOO2 FPGAs are the only FPGAs already licensed for Rambus Cryptography Research’s DPA patent portfolio, no additional license is required from Rambus Cryptography Research for use of the Athena IP cores with the licensed Microsemi FPGAs.
Microsemi’s SmartFusion2 and IGLOO2 DPA-resistant FPGAs deliver design security and protection for the valuable IP embodied within users’ programmable designs. While users choose SmartFusion2 and IGLOO2 for these capabilities, many users require additional cryptographic data security soft IP as part of their own programmable applications. Teaming with Athena enables users to employ sophisticated cryptographic microprocessor technology employing advanced DPA countermeasures as a soft IP, maintaining the highest levels of data security throughout the device/application operational cycle.
A U.S. Department of Commerce report found IP theft costs U.S. companies $200 billion to $250 billion annually, while the Organization for Economic Cooperation and Development (OECD) estimates counterfeiting and piracy cost companies as much as $638 billion per year. The SmartFusion2 and IGLOO2 FPGA’s design security protocols protect confidentiality, integrity and authenticity of the customer’s design IP throughout the life cycle of the FPGA, substantially reducing the risk of IP theft during manufacturing or from fielded systems. Complementing the FPGA’s built-in features such as a hard true random bit generator, the Athena TeraFire IP allows users to build tamper-resistant systems using secure Microsemi FPGAs that further use the Athena soft IP and cryptographic techniques to prevent system-level counterfeiting, and to provide other information assurance services vital to the security of the user’s system.
www.microsemi.com
www.athena-group.com
