We have written about eFPGA and for six years now and security even longer so it is natural to combine these two very important topics. Last month we covered the partnership between Flex Logix and Intrinsic ID, and the related white paper. Both companies are SemiWiki partners, so we were able to provide more depth and color:
In the joint Flex Logix/Intrinsic ID solution, a cryptographic key derived from a chip-unique root key is used to encrypt and authenticate the bitstream of an eFPGA. If the chip is attacked or found in the field, the bitstream of the eFPGA cannot be altered, read, or copied to another chip. That is because the content is protected by a key that is never stored and therefore is invisible and unclonable by an attacker.
Neither is the concern of counterfeit chips being inserted within the supply chain valid any longer. Each QuiddiKey user can generate an unlimited number of chip-unique keys, enabling each user in the supply chain to derive their own chip-unique keys. Each user can protect their respective secrets as their cryptographic keys will not be known to the manufacturer or other supply-chain users.
To learn even more we have a live webinar coming up where you can interact with the principles:
5G, networking, cloud storage, defense, smart home, automotive, and others – are looking to embedded FPGAs (eFPGA) to save power and reduce cost. All these applications demand reconfigurability with lower power/cost, but they also require strong security.
- Are you looking to integrate eFPGA into your devices and need a better understanding of how to secure your design?
- Do you want to understand how to encrypt the eFPGA data, so it is so secure that it is not known to anyone (not even you)?
- In that case, this is the webinar for you!
This webinar will teach you:
- The benefits of eFPGA and how it reduces power and cost.
- H0w to integrate eFPGAs into your design.
- How to secure an SoC, and specifically how to secure the contents of the eFPGA using SRAM PUF technology.
SRAM PUFs create device-unique keys that are never stored on devices, that cannot be copied from one device to the next, and that are not known to anyone. Use of SRAM PUFs guarantees the data used to program the eFPGA can be trusted and that it cannot be reused on malicious or counterfeit devices, which makes them ideally suited for protecting eFPGAs in security-sensitive markets.
Speakers:
Ralph Grundler is Senior Director of Marketing at Flex Logix, the leading supplier of eFPGA technology. An experienced business development professional, Ralph has a long history in the development and marketing of semiconductors, IP, SoCs, FPGAs, and embedded systems. He has done many videos and live presentations on a wide variety of technical subjects. He has 30 years of computer and semiconductor industry experience.
Vincent van der Leest is Director of Marketing at Intrinsic ID, the leading supplier of security based on SRAM PUF technology. He started at Intrinsic ID 13 years ago working on the research into the company’s core SRAM PUF technology, after which he spent many years in business development and marketing roles when the company started growing.
I hope to see you there!
About Flex Logix
Flex Logix is a reconfigurable computing company providing AI inference and eFPGA solutions based on software, systems and silicon. Its InferX X1 is the industry’s most-efficient AI edge inference accelerator that will bring AI to the masses in high-volume applications by providing much higher inference throughput per dollar and per watt. Flex Logix eFPGA enables volume
FPGA users to integrate the FPGA into their companion SoC resulting in a 5-10x reduction in the cost and power of the FPGA and increasing compute density which is critical for communications, networking, data centers, and others. Flex Logix is headquartered in Mountain View, California and has offices in Austin, Texas and Vancouver, Canada. For more information, visit https://flex-logix.com.
About Intrinsic ID
Intrinsic ID is the world’s leading provider of security IP for embedded systems based on PUF technology. The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip. The IP can be delivered in hardware or software and can be applied easily to almost any chip – from tiny microcontrollers to high-performance FPGAs – and at any stage of a product’s lifecycle. It is used as a hardware root of trust to protect sensitive military and government data and systems, validate payment systems, secure connectivity, and authenticate sensors. For more information, visit https://www.intrinsic-id.com/.
Comments
There are no comments yet.
You must register or log in to view/post comments.