Live and on-demand webinars drill down on topics within the realm of device identities, authentication and IoT security. Speakers include professionals from the Intrinsic ID team and our technology partners.
Taking eFPGA Security to the Next Level
5G, networking, cloud storage, defense, smart home, automotive, and others – are looking to embedded FPGAs (eFPGA) to save power and reduce cost. All these applications demand reconfigurability with lower power/cost, but they also require strong security…
- Are you looking to integrate eFPGA into your devices and need a better understanding of how to secure your design?
- Do you want to understand how to encrypt the eFPGA data, so it is so secure that it is not known to anyone (not even you)?
- In that case, this is the webinar for you!
This webinar will teach you:
- The benefits of eFPGA and how it reduces power and cost.
- How to integrate eFPGAs into your design.
- How to secure an SoC, and specifically how to secure the contents of the eFPGA using SRAM PUF technology.
Democratizing Silicon Roots of Trust with Software
What if you could improve device security by using simple software and on-chip storage to create your very own root of trust (RoT)? Well, now you can.
Join this Embedded Toolbox Live interactive webcast where engineers from embedded system security IP leader Intrinsic ID will demonstrate the company’s new root key generation and management solution, BK Software IP. In a few short minutes, they’ll use the software and a NUCLEO-L4A6ZG development board from ST Microelectronics to show how you can leverage SRAM physical unclonable functions (PUF) to:
- Create a unique device identity
- Securely store multiple keys on or off chip
- Provision the device with a certificate
- Verify device authenticity with a challenge-response protocol
Secure Your Devices with PUF Plus Hardware Root of Trust
Technology experts from Rambus and Intrinsic ID discuss how combining PUF technology with a hardware Root of Trust can provide robust security for data and devices. The session starts with the fundamentals of PUFs and example use cases. Then we discuss how the characteristics of PUFs and a hardware Root of Trust provide protection against would-be attackers as well as ongoing security over the life of a device.
In this webinar, you will:
- Learn the fundamentals of PUF technology
- Understand the integration of PUF and Root of Trust solutions
- See example use cases
Securing FPGA based Defense Electronics with Invisible Keys
As defense electronics systems become increasingly complex, with AI, Machine Learning and greater connectivity, the attack surface of these devices increases in parallel with the sophistication of adversaries.
Traditional hardware security methods are easily circumvented, making it easier to clone and insert counterfeit devices in the supply chain, resulting in theft of assets containing sensitive IP.
Authenticity and integrity of devices needs to be guaranteed through strong, user-generated cryptographic keys rooted in the structure of the FPGA itself. These cryptographic user keys need to be unclonable, never stored on a device and invisible to an attacker even when the device is powered off, particularly in an unmanned device.
In this webinar, you will learn about Intrinsic ID’s physical unclonable function (PUF) based hardware security, the ability to generate multiple device-unique keys and its long term reliability (25+ years) and entropy in harsh environments.
You will learn how the Secure Device Manager in Intel Stratix 10 and Agilex FPGAs is designed to provide a robust and updatable suite of anti-tamper features from device manufacturing through end-of life, including how the Secure Device Manager utilizes Intrinsic ID PUF technology to enhance key management and attestation features.
Discover how the Intel Secure Device Manager and Intrinsic ID PUF combined with EndoSec’s anti-tamper expertise and IP protect Intel’s Stratix 10 and Agilex FPGA platforms across the supply chain.
How to Protect Sensitive Data with SRAM PUF?
While 2020 created enormous challenges and shifted life and businesses on-line, it also elevated the need to protect the integrity of our data and privacy. Protecting sensitive data and securing communications can only be done with security solutions that are rooted in the hardware of the devices we use and that scale well over the different technologies. This webinar shows how you can utilize QuiddiKey®, the Intrinsic ID hardware IP based on SRAM PUF technology, to protect sensitive data and store them securely in NVM, on or off chip. We will explain how to:
- Create a PUF root key from a chip’s silicon fingerprint
- Derive device-unique cryptographic keys for different purposes, applications and users
- Create a secure vault for storage of keys and sensitive data
How to add a NIST-Certified Random Number Generator to any IoT device?
Researchers from Bishop Fox recently identified a new critical vulnerability of IoT devices. Their study showed that random number generators (RNGs) used in billions of IoT devices fail to provide sufficient entropy. Insufficient entropy causes predictable instead of random numbers, which severely compromises the foundation of many cryptographic algorithms. Secret keys will lose their strength, leading to broken encryption. So a new approach for generating random numbers is needed. This webinar shows how entropy can be extracted from unpredictable SRAM behavior. Using this method only requires a software installation, meaning the security systems of billions of devices can be patched without any hardware changes, even in devices that have already been deployed.
This webinar shows how you can utilize Zign™ RNG, the Intrinsic ID embedded software IP for random number generation, to add a NIST-certified random number generator to any device, simply using software. The webinar will explain to you:
- Why having a trusted RNG is important for any IoT device
- How entropy can be harvested from unpredictable SRAM behavior
- How this entropy is used to create a strong RNG
- Which steps have been taken to turn Zign RNG into a NIST-certified RNG
Securing keys in leading-edge chips with Physical Unclonable Functions
Chip manufacturers that are developing leading-edge products for applications such as high performance computing and AI, are moving their production to the most advanced technology nodes in order to get the best power-performance properties. Security becomes increasingly important on such chips for protecting integrity of the chip, protecting software running on it and to authenticate towards other devices or services in the network. Many of the required security measures rely on the implementation of cryptographic algorithms that make use of unique cryptographic keys. These cryptographic keys need to be very well safeguarded on the chip.
In this presentation we will provide technical insights in the SRAM PUF technology, its value proposition and its use as the root of trust for a secure on-chip key-vault.
Industry talk: Adding Physical Security to Trusted Software
A presentation from Intrinsic ID CTO Geert-Jan Schrijen at the TPM.dev virtual conference 2023 about how the Intrinsic ID product Zign is used to add hardware-based security to existing IoT devices, simply through a software update.
The presentation contains an introduction to the Intrinsic ID core technology of PUFs, an overview of Intrinsic ID products, and a use case example around secure cloud connectivity, including a demo.