DefAero-Mitigating Cyber Attacks - MCU Hardware Accelerators Boost - 2CP

Display portlet menu

DefAero-Mitigating Cyber Attacks - MCU Hardware Accelerators Boost - 2CP

Display portlet menu

DefAero Mitigating Cyber Attacks MCU Hardware Accelerators Boost 2CP

Hacker trying to do a cyber attack via laptop with Unauthroised Access showing on the screen

Over the years, cyber attacks on financial institutions and news organizations have garnered the lion's share of attention with their threats of financial loss and exposure of confidential information. More quietly, however, reports on successful penetration of transportation and public infrastructure systems have revealed a more insidious threat arising from a pervading weakness in the security of deeply embedded designs built to monitor and control these systems. Built to counter this threat, hardware security accelerators integrated in processors enable developers to take an essential first step in mitigating threats in embedded designs.

Networks of ubiquitous, richly interconnected devices -- as envisioned in the Internet of Things -- present significant risks for attack and malware penetration. Although cyber security remains a moving target, the most fundamental tool for hardening interconnected embedded systems remains the use of encrypted communications.

Until recently, cryptographic methods underlying encryption and decryption were limited to software solutions or cumbersome standalone crypto units. In fact, software solutions offered a reasonable approach while the industry explored alternative cryptographic algorithms. With their acceptance as national standards in FIPS 197 and worldwide standards in ISO/IEC 18033-3, ciphers such as Advanced Encryption Standard (AES) now form the underpinnings of hardware-based security features in processors from leading MCU makers.

Dedicated fully to execution of crypto algorithms, these hardware accelerators provide the performance needed to enable near real-time secure communications. While no replacement for KG crypto boxes in highly classified mission-critical systems, these MCU accelerators can handle the encryptions, decryptions and mathematical computations typically required for MCU-based applications. Just as important, these dedicated security engines operate independently of the main processor, largely allowing the main CPU to be dedicated to applications processing. For the embedded application, the result is faster execution in combination with heightened security. 

Although it is the dominant cipher by virtue of ISO/IEC 18033-3, AES is only one of several ciphers, authentication algorithms and security protocols supported by MCU hardware acceleration units. For example: 

  • Microchip's Crypto Engine includes four different cryptographic security engines designed to accelerate the computation of public/private key pair negotiations, message hash authentication and bulk data encryption/decryption (Fig. 1). Able to operate in parallel or daisy-chained to execute more sophisticated security methods, the Microchip Crypto Engine includes engines for AES, Data Encryption Standard (DES) and Triple DES (TDES), Secure Hash Algorithm (SHA-1 and SHA-256) and Message Digest 5 (MD5). Built into MCUs in Microchip's 32-bit PIC32MZ Embedded Connectivity Family, the Crypto Engine includes a DMA controller for scatter/gather data fetching and an intelligent state machine to schedule the individual security engines independently of the PIC32MZ's primary CPU.
Fig. 1: Hardware accelerators such as Microchip Crypto Engine, built into its PIC32MZ MCUs, provide dedicated execution of security algorithms. Source: Microchip Technology From: Figure 49-1

 

  • NXP offers similar capability within its Kinetis line, including a range of crypto accelerators targeted for specialized applications. For example, integrated in its QorIQ line of communications processors, a crypto accelerator supports security algorithms including RSA, Diffie-Hellman and Elliptic Curve, among others commonly used with communications standards such as IPSec, 802.1ae, SSL/TLS, SRTP, 802.11i and 802.16e.
     
  • Indeed, dedicated security engines are becoming more readily available with a broad range of capabilities and features. Designers can find dedicated security features in more conventional processors as well. For example, Intel includes its Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI), an encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in the Intel® Xeon® processor family and the Intel® CoreTM processor family.

Mitigating cyber attacks requires more than secure communications. For any embedded design, however, the ability to ensure communications integrity and access by authorized entities is a necessary start. Integrated in MCUs, dedicated security engines enable that first necessary step toward more comprehensive systems security.

DefAero-Mitigating Cyber Attacks - MCU Hardware Accelerators Boost - 2CP

Display portlet menu

DefAero-Mitigating Cyber Attacks - MCU Hardware Accelerators Boost - 2CP

Display portlet menu
Related Articles
Business people around a table in a meeting about IoT security
Customization comes with a competitive edge—and security challenge
By Guillaume Crinon   -   September 6, 2018
Whether you have an in-house team or are exporting the building of infrastructure to a trusted partner, make sure the team is asking the right questions when it comes to implementing and deploying IoT solutions.
depiction fo digital security
Who decides whether an IoT device is secure
November 11, 2019
Global IoT is continuously expanding. A source of concern is that, along with network scale, the challenges of IoT security are also increasing.
depiction of digital security
Add security to your IoT devices
November 11, 2019
As the development of Internet of Things (IoT) gains momentum, its security issues have become increasingly important. Safety certification of IoT devices is critical to improve the security of IoT.
depiction of digital security
Providing a one-stop shopping service for IoT service development
November 11, 2019
To accelerate customers’ success in the Internet of Things market, Avnet has gained the capability to offer an end-to-end solution in IoT.
person using tools
IP&E sourcing considerations for developers
August 8, 2019
Designing with IP&E components comes down to more than just simple part selection.
woman looking at tablet on airplane
The Internet of Things at Cruising Altitude: Airlines and the IoT
April 20, 2017
What are your thoughts when you step onto an airplane? “Where’s my seat?” “Is this a Wi-Fi flight?” “I hope I make my connection.”
the numbers 2016 on a dial lock
New Year’s Resolution: Let’s Get Security Right in 2016
March 22, 2017
BBC Business News recently reported that cybersecurity will be the main issue of global business in 2016. Another top trend this year? IoT and "the development of the hyper-connected world."
diagram of smartphone and connected devices
IoT Security: Real Problems and Solutions
By Guillaume Crinon   -   March 18, 2017
Learn about the real issues behind “IoT security,” and challenges for customers both from hardware and embedded / server software aspects.
Airplane making a landing on the runway at dusk
Defense/Aero Spinoffs Remain an Exceptional Source for Breakthrough Technology
March 3, 2017
Yes, automatic across the board cuts within the Department of Defense (DoD) will put the squeeze on many within the defense/aerospace supply chain.
Defense budget being cut with helicopters falling out of the sky in the background
Defense Cuts Put Squeeze on Mil/Aero Design Chain
March 3, 2017
Cutbacks in U.S. defense spending is putting the squeeze on designers and builders of military, aircraft, aerospace, communications and intelligence equipment.
Man sitting in an airplane listening to headphones and looking at a tablet
DefAero-New iPad Application Helps Pilots Assess Flying Risks - 2 CP
March 3, 2017
A new application, the iPad Flight Risk Assessment Tool (iFrat), is making it easy for pilots to assess, document and communicate risks in upcoming flights.
Laptop and 3D printer used to create a blue airplane model
3D Printing Maximizes Design Flexibility
March 2, 2017
The aerospace and defense industries have long been developers and early adopters of cutting-edge technology.
Server room with a graphic depiction of the connectivity cloud in the center of the room
32-bit MCUs Penetrate IoT Ecosystem
March 2, 2017
While 8-bit and 16-bit MCUs are well suited for IoT end-node applications, the 32-bit MCU has a key function in the IoT pyramid: It provides the data throughput, reading sensors and sending real-time sensor data over an IP-based network.

DefAero-Mitigating Cyber Attacks - MCU Hardware Accelerators Boost - 2CP

Display portlet menu
Related Events

No related Events found