MENU

Microsemi develops FPGA security/secure-boot programme

Microsemi develops FPGA security/secure-boot programme

New Products |
By eeNews Europe



Microsemi has obtained an extension of its existing Differential Power Analysis (DPA) patent license from the Cryptography Research division of Rambus. The patent license extension allows Microsemi to continue providing industry-leading solutions for the secure booting of third-party processors and FPGAs using the Cryptography Research portfolio of patented breakthrough DPA countermeasures.

Microsemi says it is the only major FPGA company that currently has a license to use the patented DPA countermeasures, and has implemented DPA-resistant secure programming and boot-up protocols in its SmartFusion2 SoC FPGAs and IGLOO2 FPGAs. Microsemi will now be able to extend the secure boot protection of these Microsemi devices to other third-party MCUs, DSPs, GPUs and FPGAs used within the same system. Microsemi is currently working with customers with the secure boot solution, and is offering the solution as a reference design that runs on Microsemi’s standard cryptographically-enabled SmartFusion2 and IGLOO2 FPGAs.

“It is more critical than ever to prevent persistent malware implants in boot and application code. Supervisory control and data acquisition (SCADA) systems, routers and data communications systems together control the world’s industrial and communications infrastructure where these threats can be catastrophic,” said Bruce Weyer, vice president of marketing and business operations, at Microsemi. “In addition, the U.S. government and defence contractors are looking to share the cost of defence systems through the expansion of foreign military sales. These DoD contractors are looking for ways to secure their advanced technology systems against reverse engineering and exploitation so they can be exported safely, and our secure boot solution is an important security layer in providing that protection.”

In the Internet of Things era, connected machines need to be secure, and to be secure in the sense of DPA resistance. Just because a machine or system says it meets the Advance Encryption Standard (AES), it does not necessarily mean it is secure, Microsemi notes – the DPA countermeasure solution increases system overall security by protecting the keys that are stored in the system against side-channel attacks.


“By extending this license, Microsemi and its customers are helping to secure the massive number of processors and FPGAs used in critical industrial, communications, networking and defence applications, many of which are still vulnerable to the DPA attacks,” said Paul Kocher, chief scientist of the Rambus Cryptography Research division. “While the security issues surrounding side channel attacks have continued to gain notoriety, expanding this needed power analysis protection for the boot stage of FPGA devices and processors is an important step towards securing overall systems.”

Microsemi also offers a software product called WhiteboxCRYPTO that allows the secure execution of standard cryptographic algorithms.

Differential Power Analysis attacks

DPA is an insidious and powerful technique hackers use to extract secrets such as cryptographic keys from an electronic device by externally monitoring the instantaneous power consumed by the device while it is operating on the secrets. CRI’s secure boot is a highly effective security measure that ensures a programmable device such as a microcontroller (MCU), digital signal processor (DSP), graphics processor (GPU) or field programmable gate array (FPGA) is executing authentic code that has not been tampered with or altered.

Microsemi; www.microsemi.com

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s