Secure FPGA

Secure FPGA

Field-programmable gate arrays (FPGAs) offer system flexibility in the field to transfer circuitry and IP by copying configuration information. This flexibility can expose confidential IP when security is not top of mind. As an FPGA designer it is critical to prevent unauthorized cloning or overbuilding of the design. To protect IP it is important to consider root of trust, device tampering and secure communications.

0720 Security FPGA



As FPGA products and designs have become more complex, the potential for malicious attacks has increased over time. Ways to secure devices during programming and while deployed are critical for customer success. Intel has responded to these challenges by implementing the Secure Device Manager (SDM) feature in many of their FPGAs. The SDM is a microprocessor block that provides a fully-authenticated, customizable configuration. It is comprised of several security features, including sector-based security, flexible key management, and remote command authentication. The SDM allows users to implement the most robust, most effective security configuration for their design every time. To learn more, see Intel’s white paper on the SDM below:

 

  

Buy Component Buy Development Kit

Even for smaller, simpler FPGAs, security concerns are a very real thing. Historically, most FPGA security features have been targeted at the biggest and most complex devices, but even smaller devices need security today. The MachXO3D provides many security features at a low cost for applications such as secure servers, chain of trust implementation, and more. It sports an integrated hardware root-of-trust and pre-verified cryptographic functions, such as unique secure ID and public/private key generation. On-device dual boot flash removes the need for external memory for configuration and allows for fail-safe programming. This can help prevent attacks were a bad actor is trying to steal IP are create vulnerabilities by intercepting the communications for external memory. These features protect devices through the entire product lifecycle. Watch the video below to learn more.

 

 

 

Buy a Development Kit to Get Started Buy Device Now

Overbuilding is a potential security risk that original equipment manufacturers (OEMs) regularly face today. Overbuilding is when contract manufacturers produce more units than ordered and sell these surplus units illegally. With all the design IP available at the contract manufacturer, preventing this can be difficult, resulting in a potential loss of sales and reputation.

 

This problem can be eliminated by using Microsemi’s Security Production Programming Solution, which is comprised of certified hardware security modules (HSMs), custom firmware, and state-of-the-art security protocols built into every Microsemi FPGA. Customers can specify how many devices to be programmed and who has the authority to program these devices, removing the possibility of overbuilding. Watch the video below to learn more:

 

 

Buy a Development Kit to Get Started

请仔细阅读我们近期更改的隐私政策。当按下确认键时,您已了解并同意艾睿电子的隐私政策和用户协议。

本网站需使用cookies以改善用户您的体验并进一步改进我们的网站。此处阅读了解关于网站cookies的使用以及如何禁用cookies。网页cookies和追踪功能或許用于市场分析。当您按下同意按钮,您已经了解并同意在您的设备上接受cookies,并给予网站追踪权限。更多关于如何取消网站cookies及追踪的信息,请点击下方“阅读更多”。尽管同意启用cookies追踪与否取决用户意愿,取消网页cookies及追踪可能导致网站运作或显示异常,亦或导致相关推荐广告减少。

我们尊重您的隐私。请在此阅读我们的隐私政策。