securing the connected world
play

Securing the connected world Flexible and scalable embedded security - PowerPoint PPT Presentation

Securing the connected world Flexible and scalable embedded security IP Pieter Willems pieter.willems@silexinsight.com V2.0 2019 Overview Silex Insight Introduction Embedded security markets and applications Security


  1. Securing the connected world Flexible and scalable embedded security IP Pieter Willems pieter.willems@silexinsight.com V2.0 – 2019

  2. Overview  Silex Insight Introduction  Embedded security markets and applications  Security requirements  Scalability and flexibility  Configurable and scalable secure enclave: eSecure

  3. This is Silex Insight! What we do: IP provider for security in embedded systems  Headquarters in Brussels, Belgium London, UK  Global presence Seoul, South-Korea Brussels, Belgium Tokyo, Japan San Jose, CA, US  Worldwide customer base Shenzhen, China  Founded in 1991 – 28 years experience Tapei, Taiwan  Silex Insight = Silicon experts with know-how  45 employees Head Office (Brussels, Belgium)

  4. A history of growth and innovation Founded as ASIC Introduction of Public Introduction of VIPER (HDMI over 1 st SoC development design house in Key and AES IP OEM board) and eSecure: Louvain-la-Neuve, for payment terminal cryptographic IP (Embedded Security IP) Belgium cores Global presence (US office) 1995 2018 2003 2015 2011 1991 1999 2016 2019 Introduction of Becomes part of the Technology & Barco Silex becomes JPEG2000 IP cores for Barco group Engineering Emmy Silex Insight FPGAs Award for J2K Interop (Private Equity funded MBO)

  5. Security Markets/Applications  From end-point, edge device to data center

  6. Security requirements Features/solutions

  7. Security requirments Algorithms/modes and protocols  Asymmetric algorithms  Symmetric algorithms - RSA/DH/DSA/CRT/ECC/ECDSA/ECDH - AES supporting all modes (GCM, CCM, CFB, CBC…) - ECC Curves: NIST, Brainpool, Koblitz, Montgomery, Edwards and others… - Ultra High performance AES-GCM/CTR/XTS - Apple HomeKit/TLS1.3: Curve25519, EdDSA, - 3GPP algorithms (Snow3G, Kasumi, ZUC) SRP - Chacha20_poly1305 – TLS 1.3/Apple HomeKit - Thread Protocol: J-PAKE - SHA1/2/3, SM3 (OSCCA) & 3-DES core - Rabin-Miller (primality check) and Key - SM4 (OSCCA) Generation  Secure communication protocols - SM2 (OSCCA), EC-KCDSA, ECIES, ECMQV - TLS/SSL  Random Number Generators - IPsec - TRNG (NIST 800-90B and AIS-31) - MACsec - DRBG (NIST 800-90A)

  8. Security requirments Application and market specifications  Performance  Resources - Asymmetric crypto - Optimal resource/perf ratio: IoT end-points High perf: V2X, fast boot apps, crypto currency, TLS - Flexible: DC/cloud, networking - connection engine Low perf: IoT end-points -  Features - Symmetric crypto (incl IP/MACsec) High perf: DC/cloud, networking, automotive - - IoT: wide variety of features, protocols/radio Low perf: IoT end-points - (crypto) to be supported - DC/cloud: limited modes/protocols but at high  Power speed and wide variety of features required - IoT end points: Low power requirements - Others: flexible power requirements

  9. Combinable products Configure it, the way - YOU - want it! Security enclave Memory protection eSecure ROT provides full system security Secure your flash and DDR Networking solutions Crypto accelerators & processors Accelerate your complete TLS, MACsec and IPsec Accelerate your crypto operations traffic CONFIGURABLE SCALABLE CUSTOMIZABLE Include features as needed Define performance and footprint Adapt to your specific needs depending on your requirement

  10. Scalability From block to solution Stand-alone, scalable, Combined into scalable Added to scalable and flexible and and configurable crypto flexible secure enclave configurable cores for accelerator to target any perfect application fit connected device SoC

  11. eSecure: BA470  Security Enclave - HW Root-of-trust  Scalable and flexible solution to serve many IoT markets/devices  Offer secure services to the Host (via mailbox)  EVITA compliance + AutoSAR API

  12. eSecure: BA470 Configurable features  eSecure (HW Root Of Trust, Security Enclave) Secure Boot - Secure Debugging - Secure Key Storage - Device Authentication - Anti-tampering – Side Channel Attack protection - PUF available - Low power features (retention, power down) - Several processors integrated - RISC-V Controller (from various partners) - ARM - MIPS - Wide range of cryptographic algorithms - Silicon proven -  Applications: Automotive, Industrial, DC/Cloud computing, IoT end Node device, Wireless communications

  13. Flexibility example KeySecure + eSecure for FPGA  KeySecure (with intrinsic ID)  eSecure-HSM - Securely generates, stores and manages any - FPGA HSM for industrial and automotive type of key applications - No access to keys by the host - EVITA compliant

  14. Integration Flexibility Private/host flash  Private Flash  Host Flash - Embedded - Embedded - External - External

  15. www.silexinsight.com sales@silexinsight.com support@silexinsight.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend