Microsemi FPGAs Create the Secure Foundation for Your System

Secure hardware is used to create a secure hardware Root of Trust. A hardware Root of Trust is an immutable and trusted starting point from which security can be extended to other parts of the system. Without this secure foundation your system can’t be protected. A secure hardware Root of Trust must include the following capabilities:

Licensed, Patented DPA Protection

– Protects design IP from copying and reverse engineering

Built-in Certified Security Functions

– True Random Number Generator, Physically Unclonable Function (PUF), Elliptical Curve Cryptography (ECC), AES, SHA, HMAC
– Tamper Detectors with Counter Measures

Supply Chain Assurance that the FPGA is Authentic

– Factory Hardware Secure Module (HSM) Flow for Secure Key Injection
– Factory Key Database Generation
– Signed Device Digital Certificate

Licensed, Patented DPA Protection Counters Side Channel Attacks

Side-Channel Analysis attacks use information that ‘leaks’ from electronic systems to determine otherwise secret information.

– Like a safecracker listening to tumblers in a lock, side-channel analysis uses changes in operating current and timing information to indirectly determine on-chip secret keys.
– Differential Power Analysis uses statistical results of many measurements to find secret keys used in cryptographic functions.
– Without DPA resistance security keys are vulnerable and security systems can be completely bypassed.
– Microsemi has licensed from CRI, a division of Rambus, their DPA resistant patent portfolio to protect key operations from DPA sice channel attacks.

The following logo is a trademark of Cryptography Research, Inc. Used under license.

Built-in Certified Security Functions

Once the on-chip security keys and configuration bit streams are protected from DPA it is important to support the cryptographic functions needed to extend security and create a hardware Root of Trust. Key cryptographic functions must include:

– True Random Number Generation- used by many cryptographic standards
– Physically Uncloneable Function- used to create device unique security keys known only to the device
– Hardware Acceleration for Security Standards – AES, SHA, HMAC and ECC

View the above video to see how security services in Microsemi SmartFusion2 SoC FPGAs and IGLOO2 FPGAs are used to support common security standards.

If your Supply Chain Isn’t Secure, How Can Your System Be?

Microsemi secure manufacturing flow:

– Inject device unique keys with FIPS Hardware Security Modules (HSMs)
– Inject device unique signed X.509 digital certificate proving authenticity of device purchased
– Secure Derived Key Database generation for customer Managed HSM flow

View this video to see how a secure supply chain is protected when using SmartFusion2 SoC FPGAs and IGLOO2 FPGAs- beginning with secrets ‘baked’ into the wafer, through wafer test, assembly and binning, all the way to sales via the distribution channel. Hardware security modules, secure key storage and X.509 certificates all contribute to the Microsemi secure manufacturing flow that protects your supply chain.

Go here for security resources, design hardware, security solutions, application examples.

And, go here for featured applications for security including Programmic Logic Control and Smart Energy.

Tags: , , , , ,

This entry was posted by Maggie Ford on at and is filed under Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

Leave a Reply

You must be logged in to post a comment.