Cloud native EDA tools & pre-optimized hardware platforms
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable IP are abundant. Especially in aerospace and defense, attacks can result in loss of IP, leakage of top-secret information, and compromised national security. A way for designers to secure their FPGAs, their sensitive data, and communications is the use of cryptography. Authenticity, integrity, and confidentiality can be guaranteed by using strong cryptographic keys rooted in the hardware of the FPGA.
Synopsys FPGA PUF IP combines a Butterfly Physical Unclonable Function (PUF) with Synopsys' helper data algorithms. Butterfly-shaped circuits are configured on the fabric of the FPGA to intrinsically generate the entropy needed for a strong hardware root of trust. Keys derived from Synopsys FPGA PUF are volatile and derived only when required, providing a significant high-security assurance. Since Synopsys PFGA PUF is part of the FPGA configuration file, it is a “soft PUF” implementation, and security functionality can be retrofitted on deployed devices, enabling remote “brownfield” installation of a hardware root of trust.
The biggest challenge when solving security problems is getting credentials, such as cryptographic keys, into the device and keeping them secure. A butterfly PUF enables designers to extract a unique device fingerprint from standard FPGA fabric for FPGA architectures in which standard uninitialized SRAM is unavailable. This fingerprint is converted to a high-quality device-unique PUF key using Synopsys' helper data algorithms (or fuzzy extractor). Synopsys FPGA PUF IP reliably reconstructs the same cryptographic key under all environmental circumstances.
Upon first use, called the enrollment, Synopsys FPGA PUF generates an activation code which, in combination with the butterfly PUF fingerprint, is used to reconstruct, on demand, in real-time, an intrinsic PUF key inside a secure perimeter. The intrinsic PUF key can be used as a root key for key derivation and wrapping. A key protected by Synopsys FPGA PUF is integrity protected and can be retrieved only on the same device, while it will be meaningless on other devices.
When combined with a crypto core, Synopsys FPGA PUF IP allows designers to provision their FPGAs with an unclonable identity consisting of a private key, a public key, and a device certificate. Once provisioned, the FPGA can prove its identity and establish a secure channel with another device, a server, or a cloud. The private key is never stored in NVM or OTP but regenerated on the fly, making the solution effective against counterfeiting.
Synopsys PPGA PUF IP | |
---|---|
Security Strength (bits) | 256 |
Maximum Key Length (bits) | 4096 |
Size : #LUTS | 14k - 16k |
Activation Code Size (bytes) | 644 |
Generate Device Keys and Random Values | ✓ |
Wrap and Unwrap Keys | (✓) |
Attack Countermeasures | ✓ |
Anti-aging Measures | ✓ |
PUF Monitoring | ✓ |
Logic BIST | (✓) |
APB Interface (optional to remove) | (✓) |
Synopsys FPGA PUF IP is easily integrated into any FPGA design. Standard deliverables include: