Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Product List
SHA-256 Authenticators for IP Protection Slide 6
Host solutions that include the SHA-256 coprocessor have three main benefits. #1) It provides the highest level of key protection. This solution uses the coprocessor’s integrated advanced hardware security technologies to protect the host and device against the following attacks: First - Non-Invasive, also known as Side channel attacks. In this scenario, the counterfeiter puts the IC into an unstable state to extract protected keys. Second - Invasive, or Visual Scanning. This kind of attack is done by scanning the surface of the IC to find the values of secret keys and data. #2) The host processor does not have to perform the SHA-256 cryptographic calculations or provide 1-Wire line driving and timing. The coprocessor does this for the microprocessor without any additional hardware needed. #3) The 1-Wire interface combines both data and power on a single pin and enables the authenticator IC to be parasitically powered. 1-Wire also allows up to six authenticators to be accessed on a single line. The block diagram illustrates a typical SHA-256 solution using a Microcontroller or FPGA with a coprocessor. The Microcontroller or FPGA communicates with the SHA-256 coprocessor via a standard I2C protocol. The most complicated part of the system is off-loaded from the micro or FPGA and handled by the coprocessor. Just like the coprocessor, the authenticator uses advanced hardware security to protect secret keys and data.
PTM Published on: 2014-08-05