Secure FPGA

Secure FPGA

Field-programmable gate arrays (FPGAs) offer system flexibility in the field to transfer circuitry and IP by copying configuration information. This flexibility can expose confidential IP when security is not top of mind. As an FPGA designer it is critical to prevent unauthorized cloning or overbuilding of the design. To protect IP it is important to consider root of trust, device tampering and secure communications.

0720 Security FPGA



As FPGA products and designs have become more complex, the potential for malicious attacks has increased over time. Ways to secure devices during programming and while deployed are critical for customer success. Intel has responded to these challenges by implementing the Secure Device Manager (SDM) feature in many of their FPGAs. The SDM is a microprocessor block that provides a fully-authenticated, customizable configuration. It is comprised of several security features, including sector-based security, flexible key management, and remote command authentication. The SDM allows users to implement the most robust, most effective security configuration for their design every time. To learn more, see Intel’s white paper on the SDM below:

 

  

Buy Component Buy Development Kit

Even for smaller, simpler FPGAs, security concerns are a very real thing. Historically, most FPGA security features have been targeted at the biggest and most complex devices, but even smaller devices need security today. The MachXO3D provides many security features at a low cost for applications such as secure servers, chain of trust implementation, and more. It sports an integrated hardware root-of-trust and pre-verified cryptographic functions, such as unique secure ID and public/private key generation. On-device dual boot flash removes the need for external memory for configuration and allows for fail-safe programming. This can help prevent attacks were a bad actor is trying to steal IP are create vulnerabilities by intercepting the communications for external memory. These features protect devices through the entire product lifecycle. Watch the video below to learn more.

 

 

 

Buy a Development Kit to Get Started Buy Device Now

Overbuilding is a potential security risk that original equipment manufacturers (OEMs) regularly face today. Overbuilding is when contract manufacturers produce more units than ordered and sell these surplus units illegally. With all the design IP available at the contract manufacturer, preventing this can be difficult, resulting in a potential loss of sales and reputation.

 

This problem can be eliminated by using Microsemi’s Security Production Programming Solution, which is comprised of certified hardware security modules (HSMs), custom firmware, and state-of-the-art security protocols built into every Microsemi FPGA. Customers can specify how many devices to be programmed and who has the authority to program these devices, removing the possibility of overbuilding. Watch the video below to learn more:

 

 

Buy a Development Kit to Get Started

개인정보 보호정책이 업데이트되었습니다. 잠시 시간을 내어 변경사항을 검토하시기 바랍니다. 동의를 클릭하면 Arrow Electronics 개인정보 보호정책 및 이용 조건에 동의하는 것입니다.

당사의 웹사이트에서는 사용자의 경험 향상과 사이트 개선을 위해 사용자의 기기에 쿠키를 저장합니다. 당사에서 사용하는 쿠키 및 쿠키 비활성화 방법에 대해 자세히 알아보십시오. 쿠키와 추적 기술은 마케팅 목적으로 사용될 수 있습니다. '동의'를 클릭하면 기기에 쿠키를 배치하고 추적 기술을 사용하는 데 동의하는 것입니다. 쿠키 및 추적 기술을 해제하는 방법에 대한 자세한 내용과 지침을 알아보려면 아래의 '자세히 알아보기'를 클릭하십시오. 쿠키 및 추적 기술 수락은 사용자의 자발적 선택이지만, 웹사이트가 제대로 작동하지 않을 수 있으며 사용자와 관련이 적은 광고가 표시될 수 있습니다. Arrow는 사용자의 개인정보를 존중합니다. 여기에서 당사의 개인정보 보호정책을 읽을 수 있습니다.