Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Tiempo Secure and Greenwaves Technologies Demonstrate Secure Element Role as Master in an Embedded System

Tiempo Secure and GreenWaves Technologies are proud to have demonstrated how a Secure Element brings additional security in a project supported by the French Government, the community of communes Grésivaudan and the Auvergne Rhone Alpes Region. While in classical architecture, developers of SoCs (System-on-Chips) usually use their CPU as the core application processor and call Secure Element functions when needed, the partnership between Tiempo Secure and GreenWaves Technologies turns the tables and demonstrates a better architecture where the Secure Element is in control of the boot process. The prototype combines a Tiempo Secure Element with a GreenWaves ultra-low power RISC-V based Application Processor targeting IoT and hearables markets.

Latest Insights: Why Only AI and Data Analytics Can Stop Financial Criminals

A Secure Element is a small component, based on a secure architecture already used in billions of SIM cards and banking cards daily. It has limited and controlled I/O, a limited and protected memory and implements physical security features; as such it constitutes a secure environment, which can be certified to the highest levels of Common Criteria.

As the Master of the SoC the Secure Element is the first to boot when the device is started thus guaranteeing that only valid software is used to start the SoC and making it substantially more resistant to hacking attempts. The fact that the boot of the whole device is controlled by the Secure Element makes it resistant to side channel attacks and fault injection attacks. The TESIC IP Secure Element boot is based on AES-256, which means that it is future proof to quantum computers attacks. Access to mass memory, generally Flash, is controlled by the Secure Element, thus preventing any unauthorized access to data. For instance, the coefficients of a neural network for noise reduction stored in the external Flash memory of a GreenWaves processor would be protected by the secret keys securely stored in the Secure Element.

In addition, this architecture allows to store the boot code in a rewritable memory, not in a ROM, allowing to update it in a secure manner during the lifecycle of the object. More generally, data needed by the SoC are stored in a non-volatile memory shared between the Secure Element and the Application Processor, bringing more flexibility to memory allocation and reducing area and therefore cost.

Related Posts
1 of 40,927

Hot AI News: Stagwell’s First Free Generative AI Writing Tool, Taylor to Debut at SXSW 2023

The project (SECURE-RISC-V) has been conducted with the support of the French government-sponsored Programme d’Investissements d’Avenir – “Investments for the Future Program” – Action Renforcement des Pôles de Compétitivité – “Reinforcement of business clusters” –, co-sponsored by the community of communes Grésivaudan, and the Appel à projets PSPC-Régions n°1 – “Call for projects PSPC-Regions #1” – from the Auvergne Rhone Alpes Region.

Sebastien Riou, Applications Manager for Tiempo Secure, declares: “This collaboration with GreenWaves has been extremely profitable for both parties: it has allowed us to iron out all potential issues in giving the role of Master to the Secure Element, and to demonstrate the benefits of this architecture in a very concrete case.”

AiThority: The 3 Building Blocks to Make AI Accessible

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.