Freescale s definition:

Size: px
Start display at page:

Download "Freescale s definition:"

Transcription

1 October 2013

2 Freescale s definition: A Trustworthy system is a system which does what its stakeholders expect it to do, resisting attackers with both remote and physical access, else it fails safe. Freescale Trust Architecture SoCs provide OEM controlled silicon features which simplify the development of trustworthy systems. The Trust Architecture is an opt in scheme, with OEM controlled trade-offs in cryptographic strength, debug visibility, sensitivity of tamper detection, and anti-cloning mitigation. 2

3 Hardware security policy enforcement Irreversible configuration of major policy decisions Secure Boot/Image Validation Integrity of the image validation key Debug Permissions Resettable (by trusted SW) secondary policy decisions Content of image to be validated Key to be used for validation HW security violation sources & consequences Memory access controls Secure Storage Device secrets only usable by hardware Locked out/wiped out on security violation User secrets protected by device secrets Protected Storage Access controlled on-chip and off-chip memory Hardware security state tracking Security violation detection and reaction Anti-cloning mitigation with FSL Unique ID per device 3

4 PCIe PCIe PCIe PCIe srio srio Interlaken LA-1 SATA SATA Power Arch CPU Power Arch CPU Power Arch CPU Power Arch CPU Plat Cache DDR Controller HV MMU HV MMU HV MMU HV MMU Battery Back-up Tamper Detect(s) Security Fuses PreBoot Loader Security Monitor Internal BootROM Power Mgmt SD/MMC SPI DUART I 2 C IFC USB w/phy Clocks/Reset GPIO CCSR SEC PME DCE CoreNet Coherency Fabric PAMU PAMU PAMU QMan BMan RMAN RMan FMan Complex FMan Parse, Classify, Distribute Buffer MAC MAC MAC MAC SERDES DMAx2 Peripheral Access Mgmt Unit SDC Real Time Debug Watchpoint Cross Trigger Perf Monitor Aurora CoreNet Trace 4

5 Code Signing Signature Verification CSF Header CSF Header S/G Table Code Signing Tool S/G Table Internal Secure Boot Code (on-chip ROM) Image Image Message Digest Hash Message Digest Hash Compare Hash Sum Pass/Fail Public Key(s) Private Key Encryption D, N Private Key E, N Hash E mod N Public Key(s) Public Key(s) Verify Key/List Public Key Decryption Signature Signature Fuse Box Public Key /List Hash Hash Key/List Fuse Box Public Key /List Hash 5

6 FSL Section 1b - FSL Section Write Protect 32b - FSL Unique ID 32b - FSL Scratchpad 0 32b - FSL Scratchpad 1 OEM Section 1b - OEM Section Write Protect 1b - Intent to Secure 1b - Clear_SFF (disable Scan) 1b - SEC disable 3b - Key Revocation (Trust 2.0 only) 2b - Debug mode Open Conditionally closed w/o notification Conditionally closed w/ notification Locked Root of Trust for Verification Persistent device secrets 256b Super Root Key Hash (2.0 supports list) 64b - Debug Challenge Value 64b - Debug Response Value 256b - One Time Programmable Master Key 32b - OEM Unique ID 32b - OEM Scratchpad 32b - OEM Scratchpad 6

7 32b General Purpose Registers b Monotonic Counter Zeroizable Master Key SFP One Time Programmable Master Key SEC AESA RNG Blob Key Key Select: OTPMK ZMK Combined MK 7

8 45 SOI products, including P3041, P5020, P5040, C29x (45nm devices with support for the battery backed LP section) 1.0v supply, worst case process, at two different ambient temps. 40C 70C 28HPM products, including T4240, T2080, LS1020A 1.0v supply, worst case process, at two different ambient temps 40C 70C 8

9 Init Test Key Non- Secure External Boot, or HW_Sec_Vio Check SW health check/ signature fail No Keys No HW_Sec_Vio + SW writes Trust bit Trusted OTPMK KEK SEC Key Usage SW Soft Fail No Key Usage, OTPMK and KEK cleared Soft Fail HW_Sec_Vio or SW Soft Fail HW_Sec_Vio or SW Soft Fail Secure No HW_Sec_Vio + SW writes Secure bit OTPMK KEK No Key Usage, OTPMK and KEK cleared, SoC RESET Req Hard Fail If Hard Fail Enabled 9

10 Public Key Hardware Accelerator (PKHA) Message Digest Hardware Accelerators (MDHA) RSA and Diffie-Hellman (to 4096b) Elliptic curve cryptography (1024b) Supports Run Time Equalization Random Number Generators (RNG4) DRBG with True RNG for seeding Snow 3G Hardware Accelerators (STHA) SHA-1, SHA-2 256,384,512-bit digests MD5 128-bit digest HMAC with all algorithms Advanced Encryption Standard Accelerators (AESA) Key lengths of 128-, 192-, and 256-bit ECB, CBC, CTR, CCM, GCM, CMAC, OFB, CFB, XCBC-MAC, and XTS Job Ring I/F Queue Interface Job Queue Controller Descriptor Controllers DMA RTIC Implements Snow 3.0 Two for Encryption (F8), two for Integrity (F9) Data Encryption Standard Accelerators (DESA) DES, 3DES (2K, 3K) ZUC Hardware Accelerators (ZHA) EEA-1 (encryption) & EIA-2 (integrity) ARC Four Hardware Accelerators (AFHA) Compatible with RC4 algorithm Kasumi F8/F9 Hardware Accelerators (KFHA) CRC Unit ECB, CBC, OFB modes CRC32, CRC32C, e OFDMA CRC Header & Trailer off-load for the following Security Protocols: IPSec, SSL/TLS, 3G RLC, PDCP, SRTP, i, e, 802.1ae CHAs PKHA RNG4 STHA ZHA AFHA KFHA MDHA AESA DESA F8, F9 as required for 3GPP A5/3 for GSM and EDGE GEA-3 for GPRS 10

11 CSF Header QorIQ ISBC CSF Header ESBC Uboot PubKey ESBC Uboot Normal Uboot stuff End normal Uboot stuff Validate [Boot Script address] [Boot Script PubKey Hash] CSF Header BootScript PubKey Validate [Image 1 address], [PubKey Hash 1] Success case Fail case Validate [Image 2 address], [PubKey Hash 2] Success case Fail case Validate [Image 3 address], [PubKey Hash 2] Success case Fail case BootM [Image 1], [Image 2], [Image 3] Validate command include functionality for parsing CSF header and validating each image AND handling failure cases. Image 1 PubKey Image 1 CSF Header Image 2 PubKey Image 2 CSF Header Image 3 PubKey Image 3 In progress: Blob encryption/decryption on images by bootscript. 11

12 Memory Blob OTPMK key encryption or ZSK key RNG CTR 0 B Plaintext AES-ECB encryption Blob key Ciphertext Data Plaintext AES-CCM encryption Ciphertext Enc. Key Enc. Data MAC Cryptographic blob 12

13 PCIe PCIe PCIe PCIe srio srio Interlaken LA-1 SATA SATA Partition 1 Power Arch CPU Partition 2 Power Arch CPU Partition 3 Power Arch CPU Partition 4 Power Arch CPU Plat Cache DDR Controller Shared HV Private Memory HV MMU Qman Portal HV MMU Qman Portal HV MMU Qman Portal HV MMU Qman Portal Partition 1 Private Memory CoreNet Coherency Fabric PAMU PAMU PAMU Peripheral Access Mgmt Unit Partition 2 Private Memory Partition 3 Private Memory SEC PME DCE QMan BMan RMAN RMan FMan Complex FMan Parse, Classify, Distribute Buffer MAC MAC MAC MAC DMAx2 SDC Real Time Debug Watchpoint Cross Trigger Perf Monitor Aurora CoreNet Trace Partition 4 Private Memory Command Control Status Registers SERDES 13

14

15 Hardware: External Tamper Detection via P_DETECT and LP_P_DETECT Secure Debug Controller (if set to Conditionally Closed with Notification) Run Time Integrity Checker (in SEC) Security Fuse Processor (if fuse array read fails, including hamming code check) Security Monitor (OTPMK and ZMK hamming code check) All sensitive flops upon detection of scan entry and exit (expert mode debug) Power Glitch In Trust 2.0: Monotonic counter roll-over Software: ISBC (Boot 0) ESBC/Trusted-Uboot (Boot 1) Any SW with write access to the Security Monitor can declare a security violation. 15

16 1. Open Debug interfaces have full access to the QorIQ memory space. If the device is already in Secure state, device secrets remain usable. This setting is only appropriate in a lab environment. 2. Conditionally Closed without Notification Debug interfaces are blocked until the user passes a challenge/response sequence. PASS = full debug access, as in the Open case FAIL = Access denied. 3 fails locks out chal/resp mechanism and reports Sec_Vio to Sec_Mon. 3. Conditionally Closed with Notification - Debug interfaces are blocked until the user passes a challenge/response sequence. PASS = Sec_Mon notified of active debug, ephemeral device secrets cleared, persistent secrets locked out, followed by full debug access, as in Open case. FAIL = Access denied. 3 fails locks out chal/resp mechanism and reports Sec_Vio to Sec_Mon. 4. Locked All debug operations are blocked. The JTAG interface can still be used for boundary scan physical interconnect testing. 16

17 to Sec_MON System Memory Map Throttle Register Watchdog Register Zone 1 SHA-256 mismatch comparator Zone 1 stored hash Zone 1 Zone 2 Zone 3 DMA controller SHA-256 mismatch comparator mismatch Zone 2 stored hash SHA-256 comparator Zone 3 stored hash Zone 4 mismatch Zone 2 Zone 4 SHA-256 comparator Zone 4 stored hash 17

18 QorIQ processors with Trust Arch include tamper detect inputs (P_DETECT, LP_P_DETECT) which provide a hardware security violation signal to the Sec_Mon. External tamper detection circuitry must maintain P_DETECT(s) at the specified voltage until a tamper event occurs. If no external tamper detection circuits are defined, P_DETECT(s) should be tied high. Upon detection of a tamper event, the external logic should drive P_DETECT(s) low. Use pull-down resistor to ensure that P_DETECT(s) go low immediately if power is cut. The tamper response is configurable. Soft Fail Persistent Device Secrets are locked out, ephemeral device secrets (if in use) is cleared, all SEC registers containing sensitive data are cleared, Sec_Mon generates IRQ. Hard Fail Soft Fail consequences plus: Battery backed Device Secret and non-secret values are cleared: active zeroization of the device platform caches and system main memory, while concurrently triggering the RESET_REQ signal. System designer must ensure that the RESET_REQ output signal triggers a device reset (HRESET or PORESET). 18

19 Freescale s focus on side channel attack resistance is focused in 2 areas: Timing analysis against public key and symmetric operations All QorIQ Trust Arch devices incorporate PKHAs with run-time equalization All symmetric CHAs perform run-time equalization Differential power analysis against AES operations Many QorIQ Trust Arch devices incorporate the AESA-DPA, a special version of the AES accelerator with DPA resistance 19

20 CPU 0 ISBC CSF Header KL, KN, WP ESBC Uboot PubKey or Key List ESBC Uboot Normal Uboot stuff Security Fuse Processor K0 K1 K2 SRKH (Key or Key List) Compare Hash (computed by ISBC) End normal Uboot stuff Validate [Boot Script address] [Boot Script PubKey Hash] New Flags for: Key vs Key List Key Number (0-3) Write Protect Key 0 Key 1 Key 2 Key 3 (irrevocable) 20

21 CPU 0 ISBC Primary Image CSF Header KL, KN, LW ESBC Uboot PubKey or Key List ESBC Uboot Normal Uboot stuff End normal Uboot stuff Validate [Boot Script address] [Boot Script PubKey Hash] Trust 2.0 will support a primary and secondary image, where failure to find a valid image at the primary location will cause the ISBC to check a configured secondary location. To execute, the secondary image must be validated using a non-revoked public key as defined by its CSF Header. A valid secondary image has same rights and privileges as a valid primary image. Purpose is to reduce risk of corrupting single valid image during firmware update or as a result of Flash block wear-out. Secondary Image CSF Header KL, KN, LW ESBC Uboot PubKey or Key List ESBC Uboot Normal Uboot stuff End normal Uboot stuff Validate [Boot Script address] [Boot Script 21 PubKey Hash]

22 Leadership High Performance 25W+ TDP P5020/10 P5040 P5021 T4240 T4160 Industry Highest CoreMark/W LS3240A LS3xxxP P4080/40 Mid-Range Performance 10-25W TDP Volume P3041 MPC8569 P2041/40 T2080 T2081 LS2100A LS2060A LS2xxx Value Performance <10W TDP Small Form Factor SEC Trust P2020/10 P1023/17 P1022/13 P1021/12 P1020//11 P1010/14 Existing 4Q 1Q Innovative solution with ARM Cortex A7: Dual-Core with ECC 2Q 3Q 4Q 1Q Product Qual C29x T1042 T1040 LS1020A 2Q 3Q 4Q 1Q 2Q 3Q 4Q 2014 T1023 LS1080A LS1040A LS1xxx 1H 2H 1H 2H Proposal Production Production Execution Planning Proposal Planning Execution Production 22 Samples

23

QorIQ Platform's Trust Architecture Overview: Adding Trust to Networked and Networking Systems FTF-NET-F0070

QorIQ Platform's Trust Architecture Overview: Adding Trust to Networked and Networking Systems FTF-NET-F0070 QorIQ Platform's Trust Architecture Overview: Adding Trust to Networked and Networking Systems FTF-NET-F0070 Geoff Waters Systems Architect A P R. 2 0 1 4 TM External Use Agenda What is a Trustworthy System?

More information

AN133: SEC 4.0: Datapath Security Accelerator on the QorIQ P4080 Processor

AN133: SEC 4.0: Datapath Security Accelerator on the QorIQ P4080 Processor July 2009 AN133: SEC 4.0: Datapath Security Accelerator on the QorIQ P4080 Processor Geoff Waters NMG Systems Engineering - Security Agenda Freescale security technology evolution Motivations for a datapath

More information

An Introduction to the QorIQ Data Path Acceleration Architecture (DPAA) AN129

An Introduction to the QorIQ Data Path Acceleration Architecture (DPAA) AN129 July 14, 2009 An Introduction to the QorIQ Data Path Acceleration Architecture (DPAA) AN129 David Lapp Senior System Architect What is the Datapath Acceleration Architecture (DPAA)? The QorIQ DPAA is a

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

Leveraging Data Plane Acceleration Techniques on the QorIQ P4080 Processor

Leveraging Data Plane Acceleration Techniques on the QorIQ P4080 Processor June 2010 Leveraging Data Plane Acceleration Techniques on the QorIQ P4080 Processor For High-Performance Network Security Applications (v1.0) John Rekesh Software Architect, Software Products Division

More information

QorIQ P4080 Software Development Kit

QorIQ P4080 Software Development Kit July 2009 QorIQ P4080 Software Development Kit Kelly Johnson Applications Engineering service names are the property of their respective owners. Freescale Semiconductor, Inc. 2009. QorIQ P4080 Software

More information

Performance Analysis with Hybrid Simulation

Performance Analysis with Hybrid Simulation 6 th November, 2008 Performance Analysis with Hybrid Simulation PN111 Matthew Liong System and Application Engineer, NMG owners. Freescale Semiconductor, Inc. 2008. r2 Overview Hybrid Modeling Overview

More information

High-Performance, Highly Secure Networking for Industrial and IoT Applications

High-Performance, Highly Secure Networking for Industrial and IoT Applications High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications

More information

On-Chip Debugging of Multicore Systems

On-Chip Debugging of Multicore Systems Nov 1, 2008 On-Chip Debugging of Multicore Systems PN115 Jeffrey Ho AP Technical Marketing, Networking Systems Division of Freescale Semiconductor, Inc. All other product or service names are the property

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000 Version 02.00.07 3/22/2004 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 Astro Subscriber

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

SEC 2/3x Descriptor Programmer s Guide

SEC 2/3x Descriptor Programmer s Guide Freescale Semiconductor Application Note Document Number: AN3645 Rev. 3, 04/2010 SEC 2/3x Descriptor Programmer s Guide by Networking and Multimedia Group Freescale Semiconductor, Inc This application

More information

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against

More information

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of

More information

QorIQ P4080 Communications Processor Product Brief

QorIQ P4080 Communications Processor Product Brief Freescale Semiconductor Product Brief Document Number: P4080PB Rev. 1, 09/2008 QorIQ P4080 Communications Processor Product Brief The QorIQ P4080 Communications Processor combines eight Power Architecture

More information

PC Touchpad Appliance

PC Touchpad Appliance October 2013 Networks strained by use of smarter, bandwidth-hungry devices need: Multicore platforms performing more intelligently and securely Low-power, low-cost, easy-to-use equipment Scalable platform

More information

Differences Between P4080 Rev. 2 and P4080 Rev. 3

Differences Between P4080 Rev. 2 and P4080 Rev. 3 Freescale Semiconductor Application Note Document Number: AN4584 Rev. 1, 08/2014 Differences Between P4080 Rev. 2 and P4080 Rev. 3 About this document This document describes the differences between P4080

More information

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R) Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

KeyStone C66x Multicore SoC Overview. Dec, 2011

KeyStone C66x Multicore SoC Overview. Dec, 2011 KeyStone C66x Multicore SoC Overview Dec, 011 Outline Multicore Challenge KeyStone Architecture Reminder About KeyStone Solution Challenge Before KeyStone Multicore performance degradation Lack of efficient

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

Frame Manager (FMan) Internals

Frame Manager (FMan) Internals Frame Manager (FMan) Internals AN130 David Lapp Senior System Architect This session is an introduction to Frame Manager Internals Introduction It is intended to be stand alone but it is helpful to have

More information

P3041 QorIQ Communications Processor Product Brief

P3041 QorIQ Communications Processor Product Brief Product Brief Document Number: P3041PB Rev. 0, 11/2011 P3041 QorIQ Communications Processor Product Brief This product brief provides an overview of the P3041 QorIQ communications processor features as

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

P2040 QorIQ implementation

P2040 QorIQ implementation Course objectives: This course has 6 main objectives: Describing the hardware implementation, particularly the boot sequence and the DDR3 controller Understanding the features of the internal interconnect

More information

Security in NVMe Enterprise SSDs

Security in NVMe Enterprise SSDs Security in NVMe Enterprise SSDs Radjendirane Codandaramane, Sr. Manager, Applications, Microsemi August 2017 1 Agenda SSD Lifecycle Security threats in SSD Security measures for SSD August 2017 2 SSD

More information

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1. Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3

More information

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Cryptographic module used in Motorola Solutions Astro XTL5000, XTS5000, APX2000, SRX2200, APX4000, APX6000, APX6000XE, APX6500,

More information

Market Trends and Challenges in Vehicle Security

Market Trends and Challenges in Vehicle Security Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader

More information

Designing with the PowerQUICC II Pro Family

Designing with the PowerQUICC II Pro Family July 2009 Designing with the PowerQUICC II Pro Family David Rosado, Product Marketing PowerQUICC Pro Family Overview of MPC831x and MPC837x Product Features Market and Applications Added Value Performance

More information

Secure Cryptographic Module (SCM)

Secure Cryptographic Module (SCM) Page 1 of 11 FIPS 140 2 Cryptographic Module Security Policy Secure Cryptographic Module (SCM) Document Version 3.0.4 FIPS 140 2 Non Proprietary JVC KENWOOD Corporation Page 2 of 11 Revision History Date

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks Pulse Cryptographic Module FIPS 140-2 Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 Copyright 2013 Juniper

More information

Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis,

Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis, May 2013 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis, mobilegt, PEG, PowerQUICC, Processor Expert, QorIQ,

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced

More information

The QorIQ portfolio The markets we address and the trends there

The QorIQ portfolio The markets we address and the trends there November 2013 Freescale in Networking The QorIQ portfolio The markets we address and the trends there Product portfolio update what is new Portfolio review: C29x High Performance Tier Mid Performance Tier

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9 Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple

More information

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy Hitachi Virtual Storage Platform (VSP) Encryption Board FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016 Copyright Hitachi, 2016 Version 4.0 Page 1 of 19

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

IOS Common Cryptographic Module (IC2M)

IOS Common Cryptographic Module (IC2M) IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION

More information

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture Architecture TrustZone Technology for Armv8-M Architecture Outline NuMicro Architecture TrustZone for Armv8-M Processor Core, Interrupt Handling, Memory Partitioning, State Transitions. TrustZone Implementation

More information

QorIQ Based Multicore LTE Layer 2 Software

QorIQ Based Multicore LTE Layer 2 Software July 2009 QorIQ Based Multicore LTE Layer 2 Software Keith Shields AC CELE R ATIO N CORENET FABRIC Freescale LTE System Enablement Overview: Software; Devices; AMC boards CONTROL RF PA RF RF PA PA RF Small

More information

RSA BSAFE Crypto-C Micro Edition Security Policy

RSA BSAFE Crypto-C Micro Edition Security Policy Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security

More information

TechDays property of their respective owners Freescale Semiconductor, Inc..

TechDays property of their respective owners Freescale Semiconductor, Inc.. TM TechDays 2013 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, the Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks

More information

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT

More information

IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy

IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy Version 1.11 July 19, 2018 This document may be reproduced only in its original entirety without

More information

VortiQa Software with Unified Threat Management for Service Provider Equipment

VortiQa Software with Unified Threat Management for Service Provider Equipment July 2009 VortiQa Software with Unified Threat Management for Service Provider Equipment Performance Optimization on QorIQ P4080 Multicore Processor Bharat Mota Director of Engineering, Software Products

More information

The Future of Security is in Open Silicon Linux Security Summit 2018

The Future of Security is in Open Silicon Linux Security Summit 2018 The Future of Security is in Open Silicon Linux Security Summit 2018 Joel Wittenauer - Embedded Software Architect Rambus Cryptography Research August 28, 2018 Agenda About Rambus Cryptography Research

More information

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

Freescale Roadmap for Communications Processors Built on Power Architecture Technology

Freescale Roadmap for Communications Processors Built on Power Architecture Technology August, 2010 Freescale Roadmap for Communications Processors Built on Power Architecture Technology NET-F0425 Jeffrey Ho Technical Marketing Reg. U.S. Pat. & Tm. Off. BeeKit, BeeStack, CoreNet, the Energy

More information

An Intelligent NIC Design Xin Song

An Intelligent NIC Design Xin Song 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) An Intelligent NIC Design Xin Song School of Electronic and Information Engineering Tianjin Vocational

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

SSD AES ENCRYPTION. Application Note. Document #AN0009 Viking SSD AES Encryption Rev. B. Purpose of this Document

SSD AES ENCRYPTION. Application Note. Document #AN0009 Viking SSD AES Encryption Rev. B. Purpose of this Document SSD AES ENCRYPTION Application Note Document #AN0009 Rev. B Purpose of this Document This application note was prepared to help OEM system designers evaluate the performance of Viking solid state drive

More information

RAD55xx Platform SoC. Dean Saridakis, Richard Berger, Joseph Marshall *** *** *** *** *** *** *** photo courtesy of NASA

RAD55xx Platform SoC. Dean Saridakis, Richard Berger, Joseph Marshall *** *** *** *** *** *** *** photo courtesy of NASA 1 RAD55xx Platform SoC Dean Saridakis, Richard Berger, Joseph Marshall *** *** *** *** *** *** *** photo courtesy of NASA 2 Agenda RAD55xx Platform SoC Introduction Processor Core / RAD750 Processor Heritage

More information

Tweeting? Please use hashtag #FTF2011. Freescale on Facebook Tag yourself in photos and upload your own!

Tweeting? Please use hashtag #FTF2011. Freescale on Facebook Tag yourself in photos and upload your own! 23 June 2011 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t he Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks

More information

Implementing a Secure Boot with Microsemi IGLOO2 FPGA

Implementing a Secure Boot with Microsemi IGLOO2 FPGA Implementing a Secure Boot with Microsemi IGLOO2 FPGA June 2013 Abstract Microsemi IGLOO 2 devices have a wide range of differentiated security features that can implement secure boot capability on an

More information

FIPS Security Policy

FIPS Security Policy Version 1.8 Last Update: 09/4/2014 1 WideBand Corporation 401 West Grand Street, Gallatin, MO 64640, USA 1 The actual module is a single chip within the depicted package WideBand Corporation, 2014 and

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

Titan silicon root of trust for Google Cloud

Titan silicon root of trust for Google Cloud Scott Johnson Dominic Rizzo Secure Enclaves Workshop 8/29/2018 Titan silicon root of trust for Google Cloud 1 Cloud Perspective: We need a silicon root of trust Software infrastructure Datacenter equipment

More information

6.857 L17. Secure Processors. Srini Devadas

6.857 L17. Secure Processors. Srini Devadas 6.857 L17 Secure Processors Srini Devadas 1 Distributed Computation Example: Distributed Computation on the Internet (SETI@home, etc.) Job Dispatcher Internet DistComp() { x = Receive(); result = Func(x);

More information

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_OSX_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple

More information

3 Features. 1 Development History. 2 Typical Applications. Freescale Semiconductor, I

3 Features. 1 Development History. 2 Typical Applications. Freescale Semiconductor, I nc. Advance Information MPC185TS/D Rev. 2.1, 2/2003 MPC185 Security Processor Technical Summary This technical summary provides an overview of the MPC185 Security Processor, including a brief development

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

Canon MFP Security Chip. ISO/IEC Security Policy

Canon MFP Security Chip. ISO/IEC Security Policy Canon MFP Security Chip ISO/IEC 19790 Security Policy Version 1.07 2016/12/26 Canon Inc. 1 Table of Contents 2 List of Figures Date of Issue: 2016/12/26 Figure 1 Exterior of Canon MFP Security Chip (FK4-1731A)...

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

Silent Circle Mobile Application Cryptographic Module

Silent Circle Mobile Application Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174

More information

Anand Raghunathan

Anand Raghunathan ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,

More information

OPTIMIZED CRYPTOGRAPHY COMPONENTS FOR CONSTRAINED ENVIRONMENTS. RSA BSAFE Crypto Kernel. Solution Brief

OPTIMIZED CRYPTOGRAPHY COMPONENTS FOR CONSTRAINED ENVIRONMENTS. RSA BSAFE Crypto Kernel. Solution Brief OPTIMIZED CRYPTOGRAPHY COMPONENTS FOR CONSTRAINED ENVIRONMENTS RSA BSAFE Crypto Kernel Solution Brief Figure 1 RSA BSAFE Crypto-C Micro Edition RSA BSAFE Crypto Kernel FIPS 140-2 out-of-the-box ANSI-C

More information

POWER7+ TM IBM IBM Corporation

POWER7+ TM IBM IBM Corporation POWER7+ TM 2012 Corporation Outline POWER Processor History Design Overview Performance Benchmarks Key Features Scale-up / Scale-out The new accelerators Advanced energy management Summary * Statements

More information

FireEye CM Series: CM-4400, CM-7400, CM-9400

FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886

More information

Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis,

Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis, April 2013 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, ColdFire+, C- Ware, the Energy Efficient Solutions logo, Kinetis, mobilegt, PEG, PowerQUICC, Processor Expert, QorIQ,

More information

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4. FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,

More information

CSE484 Final Study Guide

CSE484 Final Study Guide CSE484 Final Study Guide Winter 2013 NOTE: This study guide presents a list of ideas and topics that the TAs find useful to know, and may not represent all the topics that could appear on the final exam.

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Introducing Hardware Security Modules to Embedded Systems

Introducing Hardware Security Modules to Embedded Systems Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors

More information

SMB Appliance. SOHO Appliance

SMB Appliance. SOHO Appliance August 2011 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t he Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks

More information

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.6 Prepared for: Prepared by: Symantec Corporation

More information

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 1.3 June 25, 2015 1 Copyright Notice Copyright 2015 Dell Software,

More information

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS) KEY-UP Cryptographic Module Security Policy Document Version 0.5 Ian Donnelly Systems (IDS) December 29, 2005 Copyright Ian Donnelly Systems 2005. May be reproduced only in its original entirety [without

More information

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4 Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200

More information

Introduction to Pre-Boot Loader Supported by QorIQ Processors

Introduction to Pre-Boot Loader Supported by QorIQ Processors Introduction to Pre-Boot Loader Supported by QorIQ Processors FTF-NET-F0152 Zhongcai Zhou Application Engineer A P R. 2 0 1 4 TM External Use Introduction What does Pre-Boot Loader (PBL) do? Device configuration

More information

Hydra PC FIPS Sector-based Encryption Module Security Policy

Hydra PC FIPS Sector-based Encryption Module Security Policy Hydra PC FIPS Sector-based Encryption Module Security Policy Revision Document No. 4 30 March 2010 SPYRUS, Inc. info@spyrus.com> SPYRUS Document No. 550-074001-04 Copyright 2009

More information

Scott Johnson Dominic Rizzo Parthasarathy Ranganathan Jon McCune Richard Ho. Titan: enabling a transparent silicon root of trust for Cloud

Scott Johnson Dominic Rizzo Parthasarathy Ranganathan Jon McCune Richard Ho. Titan: enabling a transparent silicon root of trust for Cloud Scott Johnson Dominic Rizzo Parthasarathy Ranganathan Jon McCune Richard Ho Titan: enabling a transparent silicon root of trust for Cloud 1 Talk outline 01 02 03 04 05 Motivation and problem statement

More information

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FIPS 140-2 Security Policy v0.5 FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 1.0 Prepared By: Acumen Security 18504

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

QorIQ and QorIQ Qonverge Multicore SoCs and PowerQUICC Processors

QorIQ and QorIQ Qonverge Multicore SoCs and PowerQUICC Processors QorIQ and QorIQ Qonverge Multicore SoCs and QUICC Processors Selector Guide Designed for Performance. Built to Connect. freescale.com/qoriq Selector Guide Processor Selector Guide QorIQ Number Speed (MHz)

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its

More information

NXP Semiconductors JCOP 3 SecID P60 OSA FIPS Cryptographic Module Non Proprietary Security Policy

NXP Semiconductors JCOP 3 SecID P60 OSA FIPS Cryptographic Module Non Proprietary Security Policy JCOP 3 SecID P60 OSA FIPS 140 2 Cryptographic Module Non Proprietary Security Policy Version: 1.2 Date: 11/14/2017 Copyright 2017 NXP Semiconductors may be reproduced only in its original entirety (without

More information

Early Software Development Through Emulation for a Complex SoC

Early Software Development Through Emulation for a Complex SoC Early Software Development Through Emulation for a Complex SoC FTF-NET-F0204 Raghav U. Nayak Senior Validation Engineer A P R. 2 0 1 4 TM External Use Session Objectives After completing this session you

More information