[资料分享] An FPGA Design Security Solution Using a Secure Memory Device

xiaoxin1   2010-4-22 18:19 楼主
Introduction
FPGA designs are vulnerable to design theft because configuration bitstreams can be easily captured and copied.
FPGAs are more vulnerable to cloning of the entire design rather than to intellectual property (IP) theft, since
extracting IP from the bitstream is nearly impossible. In order to protect the configuration bitstream, some FPGAs are
now capable of encrypting the bitstream. However, there is an additional cost for FPGAs that do not offer embedded
bitstream encryption to encrypt the configuration bitstream due to the additional step of programming the encryption
key in the FPGA during manufacturing. For high-volume applications, using a security companion chip is much more
cost effective.
This document provides a solution to help protect FPGA designs from being cloned. Using the “identification, friend
or foe” (IFF) design security approach, this solution disables the design within the FPGA until the hash algorithm
computation matches in both the FPGA and a secure memory device, so the design remains secure even if the
configuration data bitstream is captured. In this solution, the secure memory device is use as a security companion
chip for the FPGA.

    wp-01033.pdf (2010-4-22 18:19 上传)

    510.26 KB, 下载次数: 14

回复评论

暂无评论,赶紧抢沙发吧
电子工程世界版权所有 京B2-20211791 京ICP备10001474号-1 京公网安备 11010802033920号
    写回复