Synopsys has solved the security threats faced by embedded applications

Synopsys has released the new DesignWare ARC Secure IP Subsystem. This integrated, pre-validated hardware and software IP solution addresses key embedded applications such as purchased SIM cards (eSIM) and smart metering embedded universal integrated circuit cards (eUICC). Security threats. At the heart of the ARC Secure IP subsystem is the DesignWare ARC SEM110 or SEM120D security processor, which uses SecureShield technology to create a trusted execution environment that provides advanced security features to prevent bypass attacks.

The encryption method of the secure IP subsystem is both software and hardware accelerated, and there are also security instructions and data memory controllers for encrypting and authenticating non-trusted memory accesses. The subsystem's hardware security features are complemented by software such as the NIST-certified cryptographic library, the SecureShield runtime library, and secure boot support. Synopsys' secure IP subsystem is integrated and configurable, enabling design engineers to reduce power consumption and area, implement a programmable root of trust, protect critical applications, and prevent malware from damaging and utilizing communication protocols.

Mikhail Friedland, CEO of jNet ThingX, said: "In the entire life cycle of IoT devices, from the manufacture of security components to the registration, supply, and security are the top issues. Synopsys is pre-verified ARC security. The system is integrated into the JavaCard operating system to speed up CC EAL5+ certification, improve security solutions, and avoid malicious attacks."

The DesignWare ARC Secure IP Subsystem, with its choice of ultra-low-power ARC SEM processor, utilizes SecureShield technology to create a trusted execution environment for executing code, protecting and preventing tampering. Advanced security features of the ARC SEM processor, including protection against bypass attacks, tamper-proof channels with inline instructions, data and address scrambling, memory error detection and parity, guaranteed debug security, protected keys, code and other sensitive Information, free from theft. Developers can use the ARC SEM processor to create a hardware trusted execution environment that manages the SoC's security boundaries and provides enough bandwidth for other embedded software, such as applications that require signal processing (usually required by IoT edge devices) .

The ARC security subsystem's encryption method, from pure software encryption to a dedicated hardware encryption engine, is all-encompassing, allowing the SoC architecture to balance power, performance and area requirements, and adapt to typical encryption algorithms, hash algorithms and MACs. Algorithms such as AES, DES/3DES, SHA-256, RSA, ECC. The ARC security subsystem has a NIST-certified DesignWare encryption software library that uses a wide range of algorithms to provide a variety of security features such as secure boot, secure communication, and transport layers. The safety instruction and the data controller have low delay overhead, and the security code and data decryption are stable. This subsystem has a signature tool that helps design engineers create encrypted code images, which is especially important for code stored in non-secure external memory.

John Koeter, vice president of IP marketing at Synopsys, said: "The threat of IoT automation industrial applications is rapidly increasing, requiring SoC design engineers to add robust security features from an architectural level. Synopsys' certified integrated security IP The system enables developers to implement high-security, programmable roots of trust, protect devices from major threats such as malware, and protect against the destruction of important embedded products such as eSIM cards and security components.