Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | ![]() Security features in i.MX6UL3 SODIMM SOMNXP i.MX 6UL3 ARM Cortex A7 based CPU integrates comprehensive security features making it ideal for security applications.
By: iWave Systems Technologies Pvt. Ltd. Secure Non Volatile Storage(SNVS) External Tamper Detection is a special mechanism provided through a chip pin to signal when the device encounters unauthorized opening or tampering. Inside the chip, the received signal is compared with the desired signal level, once unequal, tamper event is found. When the desired signal is fixed, it is called passive tamper; when the desired signal level is also toggling with time, it is called active tamper. The chip supports at most 10 passive tamper detection pins, or 5 active tamper pairs alternatively. Active tamper is used to detect tampering of an on chip wire mesh. There are 5 active tamper output ports and 10 external tamper inputs. Any combination of active tamper output can be configured to any one of the 10 external tamper inputs in iMX6UL3 CPU. The internal tamper detection supports voltage, temperature and clock monitors as well. The voltage Monitor, monitors the Out of Range Battery Voltage. The allowed battery voltage is from 2.5V (low-trip point) to 3.5V (high-trip point). Hysteresis is 100mV for each trip-point. Tamper will be detected when Voltage Monitor generates "Out of Range Voltage" violation. Temperature Monitor has the temperature low trip-point spec at -30°C and high trip-point spec at 115°C. Hysteresis is 5°C for each trip-point. Tamper will be detected when Temperature Monitor generates "Out of Range Temperature" Differential Power Analysis (DPA) with DES algorithm: DPA is securing a cryptographic algorithm that makes use of a secret key. It encrypts and decrypts the text using DES algorithm. If there is any mismatch between encrypted and decrypted text, it will display the error message. The basic differential power analysis attack described here relies on two properties of the DES encryption. The first is the fact that the individual DES S-box outputs produce sensitive data that can be correlated to the power information recorded from the target device. The second fact is that each DES S-box input uses only 6 bits of the 48-bit sub key used for that round, which is low enough that they may be exhaustively searched to the highest correlation. The purpose (http://www.iwavesystems.com/ End
|
|