In order to optimize your browsing experience we uses cookies. You agree to the usage of cookies when you browsing this site.
For more information regarding cookies and the processing of your personal data please read our Privacy Policy.
I understand
inner_banner_market
MARKET
Accelerate Customers Innovation
Interested in our service?
Contact Us Now!
+1-408-588-4007
2
SecureFPGA

SecureFPGA Webinar:

How to Secure Devices with an SRAM PUF-based Unclonable Identity Using GOWIN SecureFPGA 

Wednesday, August 7, 2019

Click Here for More Details

 

The latest innovation in RoT device security is GOWIN’s SecureFPGATM, which combines the advantages of an MCU and FPGA with the security functions needed for edge, IoT and Server applications. 

 

SecureFPGA provides a security library based on SRAM PUF technology with GOWIN genuine device authentication designed to eliminate attacks from the factory floor to the daily use of the end product.

 

The included security library also provides commonly used security functions making it easy to add protection to any current MCU or FPGA project

 

Features

SecureFPGA products provide a hardware Root of Trust based on PUF (Physically Unclonable Function) technology.  PUFs use the behavior of SRAM to differentiate chips from each other. They are virtually impossible to duplicate, clone or predict. This makes them very suitable for applications such as secure key generation and storage, device authentication, flexible key provisioning and chip asset management.  Each device is factory provisioned with a unique key pair that is never exposed outside of the device.

 

 

 

 The Intrinsic ID BroadKey-Pro Security library is provided with GOWIN SecureFPGA devices allowing easy integration of common security features into user applications. These features allow users to create unique device identifiers, generate/verify signatures for secure boot and encrypt/decrypt data.

      

 

 

The following video demonstrates how SecureFPGA can be used to protect private keys and user data in a MQTT cloud connectivity example. The demonstration uses SecureFPGA to protect the device keys by encrypting and decrypting them. Using this method no user keys can be tampered with in flash as they are only available after power up by decrypting them using the devices PUF generated root key pair.

 

 Click the image to watch the video and learn more!

 

The following block diagram illustrates the cloud connectivity demonstration shown and described in the video.  The demonstration uses AWS IoT as an MQTT broker.  Alibaba cloud, Microsoft Azure and other MQTT brokers can also be used easily.  On power up the private key associated with the AWS IoT "thing" is decrypted using the PUF generated device root key pair.  After that the AWS credentials are validated and communication is established to the broker and other devices on the MQTT "topic."

 

 

Secure FPGA Demonstration – MQTT Cloud Connectivity and IoT Device Communication Demo

Self Photos / Files - FPGA8

Documents Download
Data Sheet GW1NSE series of SecureFPGA Products Datasheet-Preliminary Download
White Paper Gowin Developing Secure Hardware Systems White Paper Download
Pinout GW1NSE-2C Pinout-Preliminary PDF Download
Pinout GW1NSE-2C Pinout-Preliminary XLS Download