Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June 2010 00000-A Rev. 0.00.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Trusted Symbol of the Digital Economy 1 Bill Holmes – VP Marketing ID Platform - Smart Cards.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
SSL Implementation Guide Onno W. Purbo
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
DNSSEC Cryptography Review DNSSEC Tutorial February 21, 2011 Hong Kong Will.i.am Hervey Allen.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Windows Media DRM Device Porting Kit Review Scott Plette Program Manager Media Technology Group microsoft.com Microsoft Corporation.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Chapter 31 Network Security
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
ID 911C: Case studies for Embedded Security
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Renesas Electronics America Inc. © 2012 Renesas Electronics America Inc. All rights reserved. RX Family Overview Introduction A.
1 © 2007 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Under NDA Avaya - Proprietary & Confidential. For Internal Use Only. Avaya.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. ID 930L: Board ID Embedded Security Lab Shotaro Saito Application.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Board ID – REA Sales Training Document for Internal Use only.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Smart Card Technology & Features
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
Potential vulnerabilities of IPsec-based VPN
Security fundamentals Topic 5 Using a Public Key Infrastructure.
2015 NetSymm Overview NETSYMM OVERVIEW December
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Innovation is Our Passion Online Banking Past, Present and Future.
Information Systems Design and Development Security Precautions Computing Science.
Tips and Tricks to Speed Up Your Design
Security and Encryption
Product Manager, Keon PKI
CP220x The Industry’s Smallest Ethernet Controller
Guide to Access Control Systems
General Presentation 2012.
Public Key Infrastructure from the Most Trusted Name in e-Security
Protect Your Hardware from Hacking and Theft
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Microsoft Virtual Academy
Designed for powerful live monitoring of larger installations
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June A Rev Date 06/15/2010 N. Ramatchandirane – Secure MCU

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 2 M to M Authentication Embedded interface (I2C) Small package N Series USB Secure Token * Under development AE56U NFC NFC Series* Renesas in the Secure MCU market Contact Smart Card AE4 Series AE5 Series RS4 Series Banking, ID card Contactless Smart Card AE41R RS4X Series* Banking card Mobile Phone General Promotion Selected OEM support only Embedded Enterprise

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 3 Levels of security Software security BAD Memory chip security Almost as BAD Board ID SECURE Strong crypto Tamper proof PKI for Embedded Systems Avnet VAS Keys NOT protected CPU intensive (can be OK for PKI comp. by the host) (encryption alone is NOT security) Outdated key lengths (like a ‘ 2 digits ’ PIN code) We bring proven Web user authentication technology to Embedded Systems

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 4 Low Cost Security Solutions Maxim 1-wire Secure EEPROM – 1Kb – SHA-1 Atmel CryptoAuthentication – SHA-256, authentication only Atmel CryptoMemory – 1Kb to 256Kb – Proprietary 64bit symmetrical keys

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 5 Algorithms for Security SHA-1 / SHA-256 Simple message digest Not “true” encryption – Mostly used for digital signature signing SHA-1 retired from use by US government Symmetrical Cryptography Proprietary, DES, 3DES, AES – 64, 128, 256bit keys Symmetrical keys used on both sides – Keys must be handled with the highest security – Sharing of common keys can lead to compromise – Any key compromise affects every unit Asymmetrical Cryptography RSA, ECC 1024, 2048, 4096 bit keys Uses public / private key pairs – Private keys are all different – Compromise of a single key only affects a single unit Can be more complex to implement

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 6 Case Study Background: Large, well known camera manufacturer Battery Cloning Issues – Direct Revenue Loss – Warranty Issues – LiIon Battery Safety Issues Solution Low cost SHA-1 based security device Result Camera firmware hacked to obtain keys Low cost microcontroller used to imitate security device Cloned batteries available within 3 months FAIL

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 7 Characteristics of a Secure Solution Must be based on strong cryptography Must provide for secure key storage Must provide a defense against physical attacks Physical attack on bare die Voltage Frequency Temperature Must include a secure supply chain Key generation / provisioning Device Programming

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 8 Board ID use examples

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 9 A complete one-stop-shop solution from Avnet 1- Devices are manufactured in secure Renesas facility and locked. 2- User data provided to Avnet, user keys and X509 certificates are generated by Avnet’s secure servers, 3- Devices are programmed and locked in Avnet’s secure programming center, every chip unique. 4- After programming devices are shipped only to customer or customer approved CM. 5- Entire process is auditable, customer required records produced as needed. Avnet: A Secure Supply Chain for Secure Products

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 10 Programming & Security Device Support Key Features of Programming Security Devices Preventing Duplication Traceability File and Data Storage – Customizable on a device by device basis – Serial Numbers – MAC Addresses IP Security Concurrency (High Volume) Scalability (High Volume) AVNET HAS THEM ALL COVERED

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 11 Why Bigfoot Network selected Board ID? 1- Strong authentication (RSA 2048 Bit) with tamper-proof chip 2- Easy integration of Board ID in customer design (fast TTM) 3- Avnet support services: - logistics and key/cert programming services (root cert provided by Bigfoot Networks to keep control of the chain of trust) - unique data serialized and programmed in each chip - strong support for all phases of development: sample evaluation, pre- production test and validation and MP ramp up. 4- REA experience in the Security IC market

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 12 Board ID Strengths 1- Unmatched web user like authentication 2- Built with proven PKI technology and standards 3- Strong authentication solution ideal for a high growth market: devices connected to the internet 4- COMPLETE, UNIQUE SOLUTION DEPLOYABLE NOW. Avnet will: - Provide full quotation including VAS - Handle NDA, Educate, and Support customer - Provide a unique product and logistics service (One stop shop) 5- Top companies have selected Board ID as the authentication solution in their system. Current shipment: several M units / month (same prod. family as Board ID)

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 13 What is available now Board ID kit with complete software (can be ordered from Avnet) Board ID 1.0 product (ready for MP) Full documentation (from REA and from Avnet): Without NDA: flyers, data sheet, brochures, info online (REA site – section Board ID) Sales documentation (new Board ID page on sales Reps site) With NDA: User manuals (Board ID chip, Board ID Kit), demo kit and related documentation and software Avnet programming services: Key/cert generation Production of samples (first articles) Support services on kit, Board ID chip and MP ramp up Training material (ppt): Sales, FAE (on P drive) New training course ‘Board ID overview’ on Renesas Interactive Support from REA mktg and Avnet technical team

REA INTERNAL USE ONLY © 2010 Renesas Electronics America Inc. All rights reserved. 14 Board ID product, tools and programming services are now ready for deployment. are now ready for deployment. We look forward to supporting an aggressive promotion effort by REA Sales and FAEs and Avnet teams!

Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved.