In this blog, we will learn about hardware security, its importance and will briefly discuss about the available hardware-based security solutions from Infineon.
Need for Hardware Security:
In recent years, the exponential growth of technology has opened doors for a wide range of public and private applications by sharing and analyzing generated data. This includes smart home, e-Health Care, transport ticketing, trusted computing, autonomous vehicles, smart grid, and smart manufacturing. With the plethora of opportunities that this exchange of data brings, it also opens the gates for a multitude of security risks and challenges.
For example, if an attacker takes control of an embedded device used in the car for auto-pilot, the hacker can then control the car potentially causing fatal damage. Another example that we regularly come across is when devices over the internet are affected with malware attacks such as Denial-of-Service (DoS) attacks, Botnet, Man-in-the-Middle, and Ransomware attacks to gain access leading to data leaks. Let us analyze one such attack here.
Power Analysis attacks use the power consumption of devices, leaking data to exploit a particular device. For example, consider a microcontroller in which the AES algorithm is implemented in software. Each instruction in the algorithm involves different components of the microcontroller such as the Arithmetic Logic Unit or some peripheral. Consider the move instruction that operates on the data in the internal memory taking a few cycles when compared to the data on the external memory. Because different operations will exhibit different power profiles, one can determine what type of function is being performed at a given time.
Comparison of different security environments:
Figure 1 Comparison of different security environments
Software security:
In software security, protection against vulnerability comes in the form of software that is installed in the hardware of a system. On the downside, it is prone to side-channel attacks because code and data are exposed to the outside world.
Trusted Execution Environment (TEE):
TEE runs code on a shared hardware to protect the executing code and data in terms of confidentiality (only authorized users can access the data) and integrity (no one can change the code and its behaviour); leakage which may lead to microarchitectural attacks like Fault Injection attacks and Row Hammer attacks.
Hardware security:
To protect sensitive data in hardware, the protection comes in the form of a specifically designed integrated circuit which has its own memory and hardware implementation of crypto algorithms and secure key storage. OPTIGA™ Trust family provides a number of key and data objects which hold the user- or customer-related keys and data securely.
Our hardware-based approach has two advantages:
OPTIGATM Trust products:
The OPTIGA™ Trust product family offers a full range of security chips to address individual needs in the field of embedded authentication, brand protection, and other security applications. Features of different products in OPTIGATM Trust are given in Table 1. It supports a wide range of cryptographic algorithms such as RSA, ECC, AES, and SHA.
Some of the benefits of using OPTIGATM Trust products are:
Table 1 Overview of OPTIGATM Trust family
|
OPTIGATMTrust B |
OPTIGATMTrust E |
OPTIGATM Trust X |
OPTIGATMTrust M |
Interfaces |
SWI |
I2C |
I2C |
I2C (Shielded Connection) |
NVM |
-- |
3 kByte |
10 kByte |
10 kByte |
Asymmetrical cryptography |
ECC 131-bit |
ECC 256-bit |
ECC 256-bit |
ECC 256-bit, ECC 384-bit, RSA 1024-bit, RSA 2048-bit |
Typical applications |
Authentication of consumer electronics, accessories, original replacement parts |
PKI networks, consumer electronics, smart home, industrial automation, Internet of Things (IoT), authentication of system services and accessories, original replacement parts, smart metering, system configuration management, IP/software protection |
Internet of Things (IoT), smart home, industrial automation, consumer electronics, smart metering, authentication of system services and accessories, original replacement parts, secure communication, IP/software protection |
Mutual authentication, secured communication, secured updates, key provisioning, life-cycle management, data store protection, power management, platform integrity protection |
Certifications |
-- |
-- |
CC EAL 6+ (high) for the HW |
CC EAL 6+ (high) for the HW |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
We use cookies and similar technologies (also from third parties) to collect your device and browser information for a better understanding on how you use our online offerings. This enables us to optimize and personalize your experience with Infineon and to provide you with additional services and information based on your individual profile. Details are available in our privacy policy where you can also change your preferences on cookies at any time.
By technically required cookies we mean cookies without those the technical provision of the online service cannot be ensured. These include e.g. cookies supporting essential services like a smooth reproduction of video or audio footage. So called ‘functional cookies’ are also assigned belonging to this category. Functional cookies store information in order to provide you comfortable use of our online services (e.g. language selection). The legal basis for the processing of personal data by means of cookies of this category is Infineon’s legitimate interest. This includes, among other things, the interest in having a professional external presentation as well as an optimal balancing of the loads on the server due to technical reasons.
By performance and marketing cookies we mean cookies which are technically not required. We use performance and marketing cookies only if you have given us your prior consent. With such cookies, we collect information about how users interact with our website and which pages have been visited. This helps us to understand user activity on our website on an aggregated as well as on a personal level to provide you relevant content and services.