Live and on-demand webinars drill down on topics within the realm of device identities, authentication and IoT security. Speakers include professionals from the Intrinsic ID team and our technology partners.
Securing FPGA based Defense Electronics with Invisible Keys
As defense electronics systems become increasingly complex, with AI, Machine Learning and greater connectivity, the attack surface of these devices increases in parallel with the sophistication of adversaries.
Traditional hardware security methods are easily circumvented, making it easier to clone and insert counterfeit devices in the supply chain, resulting in theft of assets containing sensitive IP.
Authenticity and integrity of devices needs to be guaranteed through strong, user-generated cryptographic keys rooted in the structure of the FPGA itself. These cryptographic user keys need to be unclonable, never stored on a device and invisible to an attacker even when the device is powered off, particularly in an unmanned device.
In this webinar, you will learn about Intrinsic ID’s physical unclonable function (PUF) based hardware security, the ability to generate multiple device-unique keys and its long term reliability (25+ years) and entropy in harsh environments.
You will learn how the Secure Device Manager in Intel Stratix 10 and Agilex FPGAs is designed to provide a robust and updatable suite of anti-tamper features from device manufacturing through end-of life, including how the Secure Device Manager utilizes Intrinsic ID PUF technology to enhance key management and attestation features.
Discover how the Intel Secure Device Manager and Intrinsic ID PUF combined with EndoSec’s anti-tamper expertise and IP protect Intel’s Stratix 10 and Agilex FPGA platforms across the supply chain.
How to Protect Sensitive Data with SRAM PUF?
While 2020 created enormous challenges and shifted life and businesses on-line, it also elevated the need to protect the integrity of our data and privacy. Protecting sensitive data and securing communications can only be done with security solutions that are rooted in the hardware of the devices we use and that scale well over the different technologies. This webinar shows how you can utilize QuiddiKey®, the Intrinsic ID hardware IP based on SRAM PUF technology, to protect sensitive data and store them securely in NVM, on or off chip. We will explain how to:
- Create a PUF root key from a chip’s silicon fingerprint
- Derive device-unique cryptographic keys for different purposes, applications and users
- Create a secure vault for storage of keys and sensitive data
Securing keys in leading-edge chips with Physical Unclonable Functions
Chip manufacturers that are developing leading-edge products for applications such as high performance computing and AI, are moving their production to the most advanced technology nodes in order to get the best power-performance properties. Security becomes increasingly important on such chips for protecting integrity of the chip, protecting software running on it and to authenticate towards other devices or services in the network. Many of the required security measures rely on the implementation of cryptographic algorithms that make use of unique cryptographic keys. These cryptographic keys need to be very well safeguarded on the chip.
Securely storing keys in advanced technology node chips is a big challenge. Traditional storage mechanisms do not scale to these technology nodes: Fuses and efuses have reliability and flexibility issues and embedded flash memory is not available on nodes below 22nm. A game changer in this field is SRAM PUF technology. It enables chips to securely extract a cryptographic root key from the unique silicon properties of the chip itself. This root key never leaves the security perimeter and is reconstructed on the fly when needed. It is used to securely encrypt additional key material for storage in external (insecure) flash memory. SRAM PUF technology hence enables a strong secure key vault for modern processor chips, making their security on par with today’s requirements.
In this presentation we will provide technical insights in the SRAM PUF technology, its value proposition and its use as the root of trust for a secure on-chip key-vault.
How to Secure Devices with an SRAM PUF-based Unclonable Identity Using GOWIN SecureFPGA
In partnership with Intrinsic ID, the leading IP provider of SRAM PUF solutions, GOWIN Semiconductor has developed an innovative FPGA product line called SecureFPGA to meet the security needs of next-generation products. SecureFPGA uses SRAM PUF (Physical Unclonable Function) technology to enable a hardware-based root of trust for device identification, key generation, firmware signing, and data encryption. For security robustness, the secret root key is never stored in the device but is instead generated as a fingerprint on demand, based on the intrinsic and unclonable properties of the FPGA’s SRAM.
This webinar will provide an overview of GOWIN’s SecureFPGA and its included security features, and examples of how the device is being used to provide a strong root of trust in a variety of user applications.
Security for Cellular IoT: SIM Will Not Protect You!
Billions of devices are connected to the Internet of Things, through connectivity standards which differ in range and spectrum (e.g., 2G/3G/4G/5G, NB-IoT, CAT-M, LoRa, SigFox, etc). One thing they all have in common: merely upholding a standard does not ensure security. Even when using widely accepted methods, such as the SIM card in cellular IoT, there is no guarantee of true end-to-end security. This leaves data vulnerable to eavesdropping and alteration at different points from edge to cloud, exposing valuable assets in market segments using these cellular connections, like Industrial IoT, critical infrastructures, automotive and wearables.
In this webinar, chip vendors, connectivity module makers and IoT device manufacturers will see how to set their products apart by leveraging Intrinsic ID’s fit-for-purpose IoT security in their product portfolio.
Utilizing Hardware-Protected Keys on Broad Market Microcontrollers
For the IoT Edge device, the cryptographic keys used to perform the services such as encrypted boot, onboarding, and over the air updates are critical components that must be protected. Chip level hardware protected keys are the standard for achieving strong security protection for embedded designs.
This session will define what a hardware protected key is and show several examples of how these keys are realized on NXP processors. The i.MX RT 1050 family of devices will be used as a real world example of how Intrinsic ID BK™ software can advance your IoT Security.
Presented with our partner NXP Semiconductors
IoT Devices Can Kill and What Chip Makers Need to Do Now
IoT devices are at growing risk – smart home appliances, vehicles and medical devices are hacked every day. Connected products are vulnerable to physical probing, network interception, reverse engineering and other attack vectors. As hackers become more clever, security solutions must be a few steps ahead. Robust remediation starts with unclonable identities for the MCU and connectivity chip at the core of an IoT product. Traditional security implementations are burdened with additional components, increased complexity, greater costs and longer time to market. By contrast, Intrinsic ID’s SRAM PUF solutions deliver a hardware root of trust with stronger security at a more attractive ROI. During our webinar we will cover:
- Why a Root of Trust is critical for securing connected devices
- How Intrinsic ID’s patented SRAM PUF powers vital use cases such as key management and device authentication
- How SRAM PUF protects against cloning, counterfeiting and IP theft
How to Easily Implement Security in Your IoT Product
For companies developing products connected to the Internet of Things, ensuring security can be a challenge. Because IoT device manufacturers often lack sufficient security expertise, they look to their chip providers to handle security. But generating, provisioning and securely storing keys on chips while shielding them from other, possibly malicious, processes on an IoT device is not a trivial task for chip manufacturers.
Intrinsic ID and Silex Insight have joined forces to deliver a solution that enables any IoT chip manufacturer – even those for which security is not a core competency – to include hardware-based key storage, key provisioning and cryptographic operations on any microprocessor or other semiconductor device that drives an IoT-connected product.
Strong Device Identities through SRAM PUF-based Certificates
IoT device manufacturers are under immense pressure to provide device personalization, strong protection of sensitive assets and in-field application services to help their products stand out from the crowd. All these features come at a high cost imposed by key delivery methods that don’t allow for the scalability of device-appropriate security.
Intrinsic ID’s key provisioning system, based on SRAM PUF, enables the creation of unique unspoofable device fingerprints rooted in hardware. GlobalSign certifies these fingerprints and adds highly scalable PKI capabilities, creating Strong Device Identities that can be trusted in IoT ecosystems.
How to Secure IoT Devices with Root-of-Trust Authentication
Secure connectivity is becoming one of the most important challenges for IoT applications. This webinar will help you learn how innovative security measures—Intrinsic ID’s patented SRAM PUF technology coupled with Trusted Secure IP from Renesas—can help you quickly and easily create device and board-level authentication to safely secure a connected IoT system.
During this webinar, you’ll learn:
- Why creating a Root of Trust is critical for securing connected embedded systems
- Benefits of SRAM PUF-based secure key provisioning compared to traditional key generation methods
- How to establish foundational security at any stage of the product lifecycle
- How to address today’s anti-counterfeiting challenge
Physical Security of IoT Design
SoC designers building IoT devices need security exceeding that found in continuously monitored consumer devices, and which makes their devices more “hacker proof.” Andes and Intrinsic ID are teaming up to provide just such a solution. The combination of Intrinsic ID technology with the Andes S801 CPU core enables designers to incorporate security for their IoT designs that is superior to that on mobile phones and PCs.