Protect Your Intellectual Property
Without Secure Hardware your Design, Data and Business are Vulnerable
- Someone copies your design
- They don't even need to know how it works
- Reverse Engineering
- Someone figures out how your design works
- They can use or improve on what was learned
- Someone uses your brand illegally on a work-alike or cloned product
- Your contract manufacturer fills your order
- They can then make more for themselves- they have all the data need!
Are Your Systems Safe?
Watch this demonstration video from Cryptographic Research, a division of Rambus, the leaders in semiconductor security to see how easy it is to extract secrets from programmable logic devices that don't use licensed DPA countermeasures.
Security is All About Layers
To Protect your IP you need Secure Hardware, Design Security and Data Security
The DPA logos are trademarks of Cryptography Research, Inc., used under license.
Are SRAM-based FPGAs Secure?
SRAM-based FPGA's lack the key capabilities required to create a trusted and secure hardware platform for a secure embedded system making them vulnerable to cloning, copying, and reverse engineering. Sensitive customer data can be attacked and embedded systems compromised.
Start Protecting Your Design Today!
Use Microsemi SmartFusion2 SoC FPGA or IGLOO2 FPGA devices in your next design to automatically protect your valuable design IP, sensitive data and embedded system. Download the Microsemi Libero SoC development tool suite and see just how quickly you can start to secure your design.
For More Information
For more detailed information on how to protect your designs visit these topic pages which provide links to white papers, videos and other related material.
Microsemi FPGAs Create the Secure Foundation for Your System
Secure hardware is used to create a secure hardware Root of Trust. A hardware Root of Trust is an immutable and trusted starting point from which security can be extended to other parts of the system. Without this secure foundation your system can't be protected. A secure hardware Root of Trust must include the following capabilities:
- Licensed, Patented DPA Protection
- Protects design IP from copying and reverse engineering
- Built-in Certified Security Functions
- True Random Number Generator, Physically Unclonable Function (PUF), Elliptical Curve Cryptography (ECC), AES, SHA, HMAC
- Tamper Detectors with Counter Measures
- Supply Chain Assurance that the FPGA is Authentic
- Factory Hardware Secure Module (HSM) Flow for Secure Key Injection
- Factory Key Database Generation
- Signed Device Digital Certificate
Licensed, Patented DPA Protection Counters Side Channel Attacks
Side-Channel Analysis attacks use information that 'leaks' from electronic systems to determine otherwise secret information.
- Like a safecracker listening to tumblers in a lock, side-channel analysis uses changes in operating current and timing information to indirectly determine on-chip secret keys.
- Differential Power Analysis uses statistical results of many measurements to find secret keys used in cryptographic functions.
- Without DPA resistance security keys are vulnerable and security systems can be completely bypassed.
- Microsemi has licensed from CRI, a division of Rambus, their DPA resistant patent portfolio to protect key operations from DPA sice channel attacks.
The following logo is a trademark of Cryptography Research, Inc. Used under license.
Built-in Certified Security Functions
Once the on-chip security keys and configuration bit streams are protected from DPA it is important to support the cryptographic functions needed to extend security and create a hardware Root of Trust. Key cryptographic functions must include:
- True Random Number Generation- used by many cryptographic standards
- Physically Uncloneable Function- used to create device unique security keys known only to the device
- Hardware Acceleration for Security Standards
- AES, SHA, HMAC and ECC
View the above video to see how security services in Microsemi SmartFusion2 SoC FPGAs and IGLOO2 FPGAs are used to support common security standards.
If your Supply Chain Isn't Secure, How Can Your System Be?
Microsemi secure manufacturing flow:
- Inject device unique keys with FIPS Hardware Security Modules (HSMs)
- Inject device unique signed X.509 digital certificate proving authenticity of device purchased
- Secure Derived Key Database generation for customer Managed HSM flow
View this video to see how a secure supply chain is protected when using SmartFusion2 SoC FPGAs and IGLOO2 FPGAs- beginning with secrets 'baked' into the wafer, through wafer test, assembly and binning, all the way to sales via the distribution channel. Hardware security modules, secure key storage and X.509 certificates all contribute to the Microsemi secure manufacturing flow that protects your supply chain.
Start Protecting Your Design Today!
Use Microsemi SmartFusion2 SoC FPGA or IGLOO2 FPGA devices in your next design to automatically protect your valuable design IP, sensitive data and embedded system. Download the Microsemi Libero SoC development tool suite and use an evaluation kit to see just how quickly you can secure your design.
For More Information
For more detailed information on Secure Hardware visit these topic pages which provide links to white papers, videos and other related material.
Protect Your Valuable Design IP From Copying and Reverse Engineering
Microsemi FPGAs leverage built-in design security features to protect your valuable design IP:
- Secure configuration bit streams via encryption and protection from DPA attacks
- Tamper protection, zeroization, and secure key storage to protect your design
- Secure Production Flow Programming
- Cryptographically Secure Build Tickets- build only N systems
- Certificate of Conformance- prove only N number of devices were built
Secure Configuration Bit Streams with DPA Protection
Microsemi FPGAs use encrypted, DPA protected and
authenticated bit streams to prevent copying and cloning.
- Only bitstreams encrypted with the key matching the key in the device will be programmed into that device
- Hardware security modules allow for secure production programming and accounting of programmed devices
Tamper Protection, Zeroization and Security Key Protection
Protecting Your Design also requires features to detect unauthorized access to critical on-chip data.
- On chip built in tamper detectors
- User configurable tamper macro with EnforcIT IP for tamper response
- Zeroize the device in response to a tamper event
- Disable JTAG, ETM
- Disable Verify
- Permanently lock user design
- Permanent Factory Test Mode Lockout
- Password protected Re-configurable security settings
Read the Introduction to the SmartFusion2 and IGLOO2 Security Model White Paper to learn more about SmartFusion2 and IGLOO2 Tamper Protection, Zeroization and Security Key Protection features.
Secure Production Flow Programming
Hardware Security Modules (HSMs), managed by a secure production center, create a secure environment using:
- Cryptographically Secure Build Tickets - build only N systems
- Certificate of Conformance - prove only N number of devices were built
Use Microsemi SmartFusion2 SoC FPGA or IGLOO2 FPGA devices in your next design to automatically protect your valuable design IP, sensitive data and embedded system. Use the Microsemi FlashPro5 programmer with Microsemi Libero SoC development tool suite to protect your valuable design IP no matter where they are programmed.
For More Information
For more detailed information on Design Security visit these topic pages which provide links to white papers, videos and other related material.
Protecting Data at Rest or in Transit is Impossible Without Secure Hardware and Design Security
Microsemi FPGAs deliver key data security capabilities to protect applications data at rest or in transit:
- Root of Trust- the immutable secure starting point for your design
- Tamper Protection and Detection- deterring and detecting physical attacks on a device
- Zeroization- used to erase all sensitive sensitive data when a tamper event is detected
- Pass-through license- for CRI patented DPA protection for securing data in transit or at rest
Building on a Secure Root of Trust
Once a secure Hardware Root of Trust is established, higher level security functions can be utilized safely.
- Secure Algorithms and Protocols
- Suite B algorithms such as: AES, SHA, HMAC, ECDH, ECDSA
- Protocols such as: IPSEC, SSL, TLS, SSH, WEP, WPA2, HAIPE
- Other algorithms and protocols benefiting from a secure execution environment
- Data Protection for:
- Financial transactions
- Medical records
- Military applications
- Trade secrets
- Personal Communication
- Secure Boot
- Protects the start-up code for processors and MCUs from attack
- The Microsemi Secure Boot reference design can be used as a starting point for your embedded system design
Tamper Prevention and Detection
Tamper prevention and detection block attacks that can extract secret data or change the state of the device, and provide an alarm signal if tampering is suspected. Some of the techniques used on Microsemi FPGAs include:
- Security lock modification
- Mesh open/short detection
- Clock tamper monitor
- Countermeasures for passive and active side channel attacks
- Detection of attempted programming port access and authentication failures
- Keys, passcodes (in NVM), and other data-at-rest (in ROM and RAM) protected cryptographically
- Digests on NVM and ROM to detect attacks on memory, keys or settings
- Microsemi offers the EnforceIT Security Monitor IP block that can flexibly process tamper flags, allow time for communication with a host system if desired, and trigger built-in or your own custom chip or system-level tamper penalties.
Tamper Penalties and Zeroization
Once tampering is detected it is useful to apply a penalty. It is common to use escalating penalties if tampering occurs too often or is too severe. A severe penalty, zeroization, can be applied to erase part or all of a device, even returning it to an unprogrammed state. Microsemi FPGAs can implement a variety of built-in penalties, such as:
- Resetting the device- so it reboots in a known, safe state
- Disabling I/O- to prevent loss of secrets
- Placing all security options in to their most secure state
- Zeroizing on-chip memory
- Erasing FPGA configuration NVM and MSS embedded NVM
- Erasing MSS SRAM, and fabric block RAMs & registers
- Erasing all crypto-variable storage incl. (optionally) the Factory Keys
- Eliminating any remnant traces of the non-volatile configuration
- Verifying all NVM and SRAM is in a known state, and
- Supplying a cryptographic proof of success
Read the Introduction to the SmartFusion2 and IGLOO2 Security Model White Paper to learn more about SmartFusion2 and IGLOO2 Tamper Penalties and Zeroization Features.
Pass-through License for CRI Patented DPA Protection
Microsemi has obtained a license from Cryptography Research, Inc. (CRI, now a division of Rambus) for the DPA patent portfolio, consisting of more than fifty patents. The pass through license:
- Extends a sub-license to customers who purchase selected Microsemi FPGA devices. The purchaser can then use any of CRI's patented DPA-mitigation techniques to protect their end-application from side-channel attacks. The protection techniques can be incorporated in the user's logic implemented in the FPGA fabric or in the user's firmware executing on a hard or soft microcontroller, in the licensed Microsemi FPGA. No additional paperwork paperwork is required of the purchaser of these devices to use this license.
- Users of Microsemi's DPA resistant Secure Boot Reference design have also been granted a pass through license to a target processor for implementing a secure boot function in conjunction with Microsemi FPGAs or SoC FPGAs. The user has only to sign an Eligibility Certification Form to be able to use CRI’s patented DPA mitigation techniques in their target processor’s boot-loader with these Microsemi FPGAs.
Read the SmartFusion2 Data Security Devices Product Brief and the IGLOO2 Data Security Devices Product Brief to find out more information about the advantages the CRI pass-through license brings to your designs.
Visit the Microsemi Secure Boot web page to access the information needed to learn about, evaluate and purchase your own secure boot reference design.
Enabling Public Key Infrastructure
For More Information
For more detailed information on Data Security visit these topic pages which provide links to white papers, videos and other related material.
All security related resources are listed on this page and are organized by media type for easy access. You will find Security Solutions, Application notes, White Papers, Videos, Security related IP and other useful design related content. To learn more about a specific area of interest, refer to the Resource Pages that collect material based on a topic.
- The SmartFusion2 Security Evaluation Kit - provides the low-cost platform to evaluate design and data security features offered by the SmartFusion2 devices. Evaluation board features M2S090TS-FGG484 90K LE device and includes various high speed interfaces like PCIe Gen2x1, four SMA connectors for SERDES, RJ45 for 10/100/1000 Ethernet. Current measurement test points have been provided to evaluate the low-power capabilities of the device. Using SmartFusion2 device features and on-board resources, kit helps in quick prototyping of low-power, secure and highly integrated applications.
|Design of a Secure Personal Health Monitoring System||167 KB||1/2104|
|Design of a Secure Wireless Communication System||570 KB||1/2014|
|Design of a Safe and Secure Process Control System||510 KB||1/2014|
|Design of a Secure Smart Energy Metering and Control System||501 KB||1/2014|
|Design of a Secure Control Plane Bridge||510 KB||1/2014|
|Design of a Secure and Reliable Data Recorder||51 KB||4/2014|
|Introduction to the SmartFusion2 and IGLOO2 Security Model||1 MB||1/2014|
|Overview of Microsemi Antifuse Device Security||1 MB||1/2014|
|Introduction to Implementing Design Security with Microsemi SmartFusion2 and IGLOO2 FPGAs||1 MB||1/2014|
|Overview of Design Security Using Microsemi FPGAs and SoC FPGAs||517 KB||1/2014|
|Overview of Secure Boot with Microsemi IGLOO2 FPGAs||210 KB||4/2014|
|Overview of Secure Boot with Microsemi SmartFusion2 FPGAs||1 MB||4/2014|
|Overview of Data Security Using Microsemi FPGAs and SoC FPGAs||1 MB||1/2014|
|Microsemi Secure Boot Reference Design White Paper||1 MB||6/2014|
|Overview of Supply Chain Assurance of Intelligent ICs||415 KB||1/2014|
|Security Scenarios||1 MB||9/2013|
|Truth in Randomness||517 KB||9/2013|
|Securing Your Supply Chain Life Cycle||210 KB||1/2014|
|Securing Your Embedded System Life Cycle||330 KB||1/2014|
|Its Easy to Protect Your Embedded System from Theft White Paper||330 KB||9/2013|
|WhiteBoxCRYPTO Strength of Security||330 KB||3/2014|
|Protecting FPGAs from Power Analysis||1 MB||4/2010|
|Secure Hardware Topics|
|Protect FPGAs from Theft||NA||1/2014|
|Secure Life Cycle||NA||1/2014|
|Design Security Topics|
|Protect Your Design||NA||1/2014|
|Implement Design Security||NA||1/2014|
|Data Security Topics|
|Dont be the Weakest Link - Secure Supply Chain
|Cutting Malware off at the Root - Secure Boot
|How Easy is it to Secure Your Design?||NA||9/2013|
|Enabling Design Security Overview||NA||9/2014|
|SmartFusion2 and IGLOO2 Cryptographic Services Video||NA||4/2014|
|Supply Chain Life Cycle||NA||1/2014|
|Embedded System Life Cycle||NA||1/2014|
|An Introduction to the Secure Boot Reference Design||NA||4/2014|
|An Introduction to Side-Channel Analysis||NA||1/2014|
|What is Design Security in a Mainstream SoC Chalk Talk||NA||9/2013|
|Enforce-IT(R) Security Monitor||490 KB||1/2013|
|Code-Seal(TM) Software Anti-Tampering||350 KB||1/2014|
|SmartFusion2 SoC and IGLOO2 FPGAs Security Features||380 KB||9/2014|
|Device Densities, All Types (non-S, non-T, S, TS)|
* Algorithm implementations not yet validated by NIST
CRI DPA Countermeasure Validation Program
Microsemi has been granted certification of all SmartFusion2 and IGLOO2 FPGAs for seven protocols and services used to implement design security in these devices under the CRI DPA Countermeasure Validation Program after a thorough assessment by a CRI-accredited third-party security laboratory. This is the first ever such certification applying to an FPGA, and currently no SRAM FPGAs hold this or any similar certification.
- The following logo is a trademark of Cryptography Research, Inc. used under license:
|CRI DPA Patents and Applications List||1/2015|
Security Related IP Cores from Microsemi