Secure Programmable Logic
Application security technology using FPGA and SoCs.
Intel provides a variety of security capabilities to secure your reconfigurable logic designs, system, and data. These capabilities include secure fuse-based and battery-backed root keys, encrypted design bitstream, and other key protection, data erasure, and glitch-protection features.
Intel® Stratix® 10 FPGAs and SoCs further enhance these capabilities with a dedicated, glitch-resistant Secure Device Manager, a Physically Unclonable Function for more secure root key and device identity protection, and dedicated hard encryption and authentication accelerators.
Enabled by secure programmable logic:
Data clouds and data centers must protect customer and internal data, and must also protect customer virtual instances from interfering with one another. Today's data centers heavily leverage open source software and PKI technology. However, programmable logic solutions can provide additional security in the form of hardware-enforced isolation, hardware identity management, and hardware and Hyperflex accelerated authentication. Additionally, we provide highly agile bitstream and partial bitstream authentication tools that allow cloud security architects to ensure high integrity, trusted data center solutions.
High-speed packet routers, switches, and enterprise networks are some of the most sought-after targets for malicious and state actors. Although much network management infrastructure is migrating to Software Defined Networks (SDN), many of the high-speed search, sort, and security functions remain in or migrate to dedicated and programmable logic.
Intel FPGAs provide programmable design solutions to accelerate network management, and security solutions for the data backbones of enterprise and infrastructure systems.
Data communication endpoints—from personal phones and sensors to industrial power and manufacturing equipment—must be secured from malicious commands and data. Intel FPGAs provide hardware command/control logic that is inherently more secure than frequently updated software, and provides multiple strong authentication capabilities in both hard and soft logic. Hardened authenticators are highly resistant to remote attacks, and soft logic authenticators can be implemented in endless redundant and failsafe combinations to meet any level of endpoint security.