Securing the connected world Flexible and scalable embedded security IP Pieter Willems pieter.willems@silexinsight.com V2.0 – 2019
Overview Silex Insight Introduction Embedded security markets and applications Security requirements Scalability and flexibility Configurable and scalable secure enclave: eSecure
This is Silex Insight! What we do: IP provider for security in embedded systems Headquarters in Brussels, Belgium London, UK Global presence Seoul, South-Korea Brussels, Belgium Tokyo, Japan San Jose, CA, US Worldwide customer base Shenzhen, China Founded in 1991 – 28 years experience Tapei, Taiwan Silex Insight = Silicon experts with know-how 45 employees Head Office (Brussels, Belgium)
A history of growth and innovation Founded as ASIC Introduction of Public Introduction of VIPER (HDMI over 1 st SoC development design house in Key and AES IP OEM board) and eSecure: Louvain-la-Neuve, for payment terminal cryptographic IP (Embedded Security IP) Belgium cores Global presence (US office) 1995 2018 2003 2015 2011 1991 1999 2016 2019 Introduction of Becomes part of the Technology & Barco Silex becomes JPEG2000 IP cores for Barco group Engineering Emmy Silex Insight FPGAs Award for J2K Interop (Private Equity funded MBO)
Security Markets/Applications From end-point, edge device to data center
Security requirements Features/solutions
Security requirments Algorithms/modes and protocols Asymmetric algorithms Symmetric algorithms - RSA/DH/DSA/CRT/ECC/ECDSA/ECDH - AES supporting all modes (GCM, CCM, CFB, CBC…) - ECC Curves: NIST, Brainpool, Koblitz, Montgomery, Edwards and others… - Ultra High performance AES-GCM/CTR/XTS - Apple HomeKit/TLS1.3: Curve25519, EdDSA, - 3GPP algorithms (Snow3G, Kasumi, ZUC) SRP - Chacha20_poly1305 – TLS 1.3/Apple HomeKit - Thread Protocol: J-PAKE - SHA1/2/3, SM3 (OSCCA) & 3-DES core - Rabin-Miller (primality check) and Key - SM4 (OSCCA) Generation Secure communication protocols - SM2 (OSCCA), EC-KCDSA, ECIES, ECMQV - TLS/SSL Random Number Generators - IPsec - TRNG (NIST 800-90B and AIS-31) - MACsec - DRBG (NIST 800-90A)
Security requirments Application and market specifications Performance Resources - Asymmetric crypto - Optimal resource/perf ratio: IoT end-points High perf: V2X, fast boot apps, crypto currency, TLS - Flexible: DC/cloud, networking - connection engine Low perf: IoT end-points - Features - Symmetric crypto (incl IP/MACsec) High perf: DC/cloud, networking, automotive - - IoT: wide variety of features, protocols/radio Low perf: IoT end-points - (crypto) to be supported - DC/cloud: limited modes/protocols but at high Power speed and wide variety of features required - IoT end points: Low power requirements - Others: flexible power requirements
Combinable products Configure it, the way - YOU - want it! Security enclave Memory protection eSecure ROT provides full system security Secure your flash and DDR Networking solutions Crypto accelerators & processors Accelerate your complete TLS, MACsec and IPsec Accelerate your crypto operations traffic CONFIGURABLE SCALABLE CUSTOMIZABLE Include features as needed Define performance and footprint Adapt to your specific needs depending on your requirement
Scalability From block to solution Stand-alone, scalable, Combined into scalable Added to scalable and flexible and and configurable crypto flexible secure enclave configurable cores for accelerator to target any perfect application fit connected device SoC
eSecure: BA470 Security Enclave - HW Root-of-trust Scalable and flexible solution to serve many IoT markets/devices Offer secure services to the Host (via mailbox) EVITA compliance + AutoSAR API
eSecure: BA470 Configurable features eSecure (HW Root Of Trust, Security Enclave) Secure Boot - Secure Debugging - Secure Key Storage - Device Authentication - Anti-tampering – Side Channel Attack protection - PUF available - Low power features (retention, power down) - Several processors integrated - RISC-V Controller (from various partners) - ARM - MIPS - Wide range of cryptographic algorithms - Silicon proven - Applications: Automotive, Industrial, DC/Cloud computing, IoT end Node device, Wireless communications
Flexibility example KeySecure + eSecure for FPGA KeySecure (with intrinsic ID) eSecure-HSM - Securely generates, stores and manages any - FPGA HSM for industrial and automotive type of key applications - No access to keys by the host - EVITA compliant
Integration Flexibility Private/host flash Private Flash Host Flash - Embedded - Embedded - External - External
www.silexinsight.com sales@silexinsight.com support@silexinsight.com
Recommend
More recommend