Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Product List
Host solutions that include the SHA-256 coprocessor have three main benefits. #1) It provides the highest level of key protection. This solution uses the coprocessor’s integrated advanced hardware security technologies to protect the host and device against the following attacks: First - Non-Invasive, also known as Side channel attacks. In this scenario, the counterfeiter puts the IC into an unstable state to extract protected keys. Second - Invasive, or Visual Scanning. This kind of attack is done by scanning the surface of the IC to find the values of secret keys and data. #2) The host processor does not have to perform the SHA-256 cryptographic calculations or provide 1-Wire line driving and timing. The coprocessor does this for the microprocessor without any additional hardware needed. #3) The 1-Wire interface combines both data and power on a single pin and enables the authenticator IC to be parasitically powered. 1-Wire also allows up to six authenticators to be accessed on a single line. The block diagram illustrates a typical SHA-256 solution using a Microcontroller or FPGA with a coprocessor. The Microcontroller or FPGA communicates with the SHA-256 coprocessor via a standard I2C protocol. The most complicated part of the system is off-loaded from the micro or FPGA and handled by the coprocessor. Just like the coprocessor, the authenticator uses advanced hardware security to protect secret keys and data.
PTM Published on: 2014-08-05