Embedded Computing Design E-mag

Embedded Computing Design – Winter 2017

Issue link: https://www.embedded-computing.com/i/903814

Contents of this Issue

Navigation

Page 27 of 31

D espite all the awareness and discussion about embedded systems needing higher levels of secu- rity, few systems today have a mandated security specification. Unfortunately, security is an afterthought for the majority of design specifications. Many engineers and architects assume that software will secure the system, so they simply need to concern themselves with protecting the IP that goes into their processor or system. However, nothing could be further from the truth. Design engineers and architects need to implement security features not only in software, but in hardware too. Hardware security can: › Protect products from being cloned or overbuilt › Protect IP that enables companies to keep differentiating Security in embedded designs has been a hot topic for a number of years, but security means different things to different people and organizations. Coming from experience, what one individual considers secure design requirements can vary dramatically from others. STRATEGIES: SECURITY Mid-range FPGAs for design and data security: No excuses By Ted Marena, Microsemi Corporation 28 Embedded Computing Design | Winter 2017 www.embedded-computing.com › Protect data communications to prevent fraud and keep company brands from being tarnished If you do not understand how to implement these features, you are not alone. Fortunately, there are options in the form of mid-range-density FPGAs that address modern security requirements. The following addresses the key functions required to make a design significantly more secure. Breaking down security requirements The first step is to break down the security requirements of a design into two broad categories: design security and data security. › Design security means taking steps to prevent IP from being extracted from silicon, which translates into a requirement for differential power analysis (DPA) countermeasures. › Data security involves securing cloud and/or machine-to-machine (M2M) communications, leveraging secure storage for physically unclonable function- based (PUF-based) key generation and a DPA-resistant encryption engine. Let's look at each category in more detail and provide application examples of how mid-range FPGA architectures can address their requirements.

Articles in this issue

Links on this page

view archives of Embedded Computing Design E-mag - Embedded Computing Design – Winter 2017