We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X

Design security builds on top of our secure hardware platform to provide confidentiality and authenticity to your design while monitoring the environment for physical attacks. Additionally, our secure manufacturing flow can extend to your manufacturing facilities anywhere in the world by adopting our secure production programming solution.

Differential Power Analysis (DPA)


The process for programming or “loading” FPGAs needs to be side channel-resistant regardless of whether they are nonvolatile or SRAM FPGAs. Our FPGAs, starting with the introduction of SmartFusion® 2 and IGLOO® 2 in 2013, have side channel resistance built into programming operations regardless of whether those operations occur in a lab or via remote update mechanisms.

Anti-Tamper


Actively monitoring the environment is another technique to protect the FPGA design from physical attack. There are 32 tamper flags that you can monitor; here are just some of the tamper detectors on PolarFire®, RT PolarFire and PolarFire SoC FPGA devices:

Locks


The PolarFire family of FPGAs devices contains a variety of locks, allowing you to tailor access rights to your application profile. You can temporarily unlock user lock bits using the appropriate passcode assigned to that lock, and they can remain unlocked until the next device reset, JTAG reset or power-down. Any permanent change to locks must come from a bitstream or the most important lock bits, and from an antitamper perspective, you can also use parity bits to detect any loss of integrity. These bits are monitored continuously during run-time and generate a tamper detection flag immediately if a tamper event is detected. 

Secure Programming


Using Hardware Security Modules (HSMs) and secure production programming software provides the following three key user benefits. 

  •  The ability to encrypt and provision an FPGA in a less-trusted manufacturing environment
  • Control over how many devices you program and therefore how many systems you build
  • The ability to audit the manufacturing process in a cryptographically controlled manner

You can network your manufacturing site for job file transfer or you can burn a CD/DVD and sneaker net the job file to the manufacturing site.

Design Site


Manufacturing Site


DesignShield

Data at rest should exhibit the property of confidentiality. You can use DesignShield to protect the PolarFire family of devices at rest. DesignShield encrypts the logic design using three different types of encryption methods: logic encryption, routing encryption and mathematical encryption. Without the presence of the “key input”, your design will not operate. The on-chip Secure Nonvolatile Memory (SNVM) store applies keys on power-up and a unique-per-device PUF key protects the SNVM at rest.