Live and on-demand webinars drill down on topics within the realm of device identities, authentication and IoT security. Speakers include professionals from the Intrinsic ID team and our technology partners.
Secure Your Devices with PUF Plus Hardware Root of Trust
Technology experts from Rambus and Intrinsic ID discuss how combining PUF technology with a hardware Root of Trust can provide robust security for data and devices. The session starts with the fundamentals of PUFs and example use cases. Then we discuss how the characteristics of PUFs and a hardware Root of Trust provide protection against would-be attackers as well as ongoing security over the life of a device.
In this webinar, you will:
- Learn the fundamentals of PUF technology
- Understand the integration of PUF and Root of Trust solutions
- See example use cases
How to add a NIST-Certified Random Number Generator to any IoT device?
Researchers from Bishop Fox recently identified a new critical vulnerability of IoT devices. Their study showed that random number generators (RNGs) used in billions of IoT devices fail to provide sufficient entropy. Insufficient entropy causes predictable instead of random numbers, which severely compromises the foundation of many cryptographic algorithms. Secret keys will lose their strength, leading to broken encryption. So a new approach for generating random numbers is needed. This webinar shows how entropy can be extracted from unpredictable SRAM behavior. Using this method only requires a software installation, meaning the security systems of billions of devices can be patched without any hardware changes, even in devices that have already been deployed.
This webinar shows how you can utilize Zign™ RNG, the Intrinsic ID embedded software IP for random number generation, to add a NIST-certified random number generator to any device, simply using software. The webinar will explain to you:
- Why having a trusted RNG is important for any IoT device
- How entropy can be harvested from unpredictable SRAM behavior
- How this entropy is used to create a strong RNG
- Which steps have been taken to turn Zign RNG into a NIST-certified RNG
Securing FPGA based Defense Electronics with Invisible Keys
As defense electronics systems become increasingly complex, with AI, Machine Learning and greater connectivity, the attack surface of these devices increases in parallel with the sophistication of adversaries.
Traditional hardware security methods are easily circumvented, making it easier to clone and insert counterfeit devices in the supply chain, resulting in theft of assets containing sensitive IP.
Authenticity and integrity of devices needs to be guaranteed through strong, user-generated cryptographic keys rooted in the structure of the FPGA itself. These cryptographic user keys need to be unclonable, never stored on a device and invisible to an attacker even when the device is powered off, particularly in an unmanned device.
In this webinar, you will learn about Intrinsic ID’s physical unclonable function (PUF) based hardware security, the ability to generate multiple device-unique keys and its long term reliability (25+ years) and entropy in harsh environments.
You will learn how the Secure Device Manager in Intel Stratix 10 and Agilex FPGAs is designed to provide a robust and updatable suite of anti-tamper features from device manufacturing through end-of life, including how the Secure Device Manager utilizes Intrinsic ID PUF technology to enhance key management and attestation features.
Discover how the Intel Secure Device Manager and Intrinsic ID PUF combined with EndoSec’s anti-tamper expertise and IP protect Intel’s Stratix 10 and Agilex FPGA platforms across the supply chain.
How to Protect Sensitive Data with SRAM PUF?
While 2020 created enormous challenges and shifted life and businesses on-line, it also elevated the need to protect the integrity of our data and privacy. Protecting sensitive data and securing communications can only be done with security solutions that are rooted in the hardware of the devices we use and that scale well over the different technologies. This webinar shows how you can utilize QuiddiKey®, the Intrinsic ID hardware IP based on SRAM PUF technology, to protect sensitive data and store them securely in NVM, on or off chip. We will explain how to:
- Create a PUF root key from a chip’s silicon fingerprint
- Derive device-unique cryptographic keys for different purposes, applications and users
- Create a secure vault for storage of keys and sensitive data
Securing keys in leading-edge chips with Physical Unclonable Functions
Chip manufacturers that are developing leading-edge products for applications such as high performance computing and AI, are moving their production to the most advanced technology nodes in order to get the best power-performance properties. Security becomes increasingly important on such chips for protecting integrity of the chip, protecting software running on it and to authenticate towards other devices or services in the network. Many of the required security measures rely on the implementation of cryptographic algorithms that make use of unique cryptographic keys. These cryptographic keys need to be very well safeguarded on the chip.
Securely storing keys in advanced technology node chips is a big challenge. Traditional storage mechanisms do not scale to these technology nodes: Fuses and efuses have reliability and flexibility issues and embedded flash memory is not available on nodes below 22nm. A game changer in this field is SRAM PUF technology. It enables chips to securely extract a cryptographic root key from the unique silicon properties of the chip itself. This root key never leaves the security perimeter and is reconstructed on the fly when needed. It is used to securely encrypt additional key material for storage in external (insecure) flash memory. SRAM PUF technology hence enables a strong secure key vault for modern processor chips, making their security on par with today’s requirements.
In this presentation we will provide technical insights in the SRAM PUF technology, its value proposition and its use as the root of trust for a secure on-chip key-vault.