Supplier eBooks

Analog Devices - Embedded Security: Keeping Edge Data Safe

Issue link: https://resources.mouser.com/i/1506851

Contents of this Issue

Navigation

Page 6 of 24

private key pairs, and valid certificates (collectively known as credentials) before use. In this scheme, designers work directly with original equipment manufacturers (OEMs) to verify that devices with integrated security solutions will contain cryptographic credentials known only by the OEM. By embedding a security solution holding these credentials into the design, the designer can ensure secure use management, as the only possible way for the correct cryptographic keys to be present in the device is if the device was built with genuine parts. Here, secure use management is enabled via the boot-up sequence associated with these security devices; this boot- up occurs before the user even gets the opportunity to use the tool. On boot- up, the host system will first initiate a communication sequence with the security devices via a challenge (i.e., cryptographic algorithm) to verify that the part in the tool responds with the right credentials (i.e., keys and certificates). From there, the host can also check other metadata like counter values, which get incremented on each use, ensuring that the device has only been used the appropriate number of times. Analog Devices helps customers design devices that ensure secure use management by • Uniquely offering secure interface technologies like 1-Wire. • Working directly with customers to ensure that cryptographic keys are kept secure. • Providing customers with exclusive use of cryptographic algorithms like Secure Hash Algorithm 3 (SHA-3). • Offering secure authenticator devices that are easy to incorporate into existing designs. C h a p t e r 1 | S e c u r e U s e M a n a g e m e n t Usage and migration to the cloud have exploded in recent years and are expected to grow exponentially in coming years, especially with the introduction of AI-assisted services development, which requires significant computing power. In these scenarios, data security becomes especially critical." Venkata Kishore Kajuluri Senior Hardware Security Engineer, Oracle Cloud Infrastructure 7 Embedded Security: Keeping Edge Data Safe

Articles in this issue

Links on this page

view archives of Supplier eBooks - Analog Devices - Embedded Security: Keeping Edge Data Safe