As the market need for security evolves, platforms must also evolve quickly to defend against cyberattacks during start-up, real-time and system updates. With these new market threats, designers cannot assume the equipment they are using is trustworthy and they must start looking to new technology to secure their systems. Microchip Technology has announced its fully configurable microcontroller-based CEC1736 Trust Shield family that solves this challenge by going beyond NIST 800-193 platform firmware resiliency guidelines with runtime firmware protection that anchors the secure boot process while establishing an entire chain of trust for the system platform.
Microchip’s CEC1736 Trust Shield family spans silicon, software, tools, a development board and provisioning capabilities that drive the end-to-end platform firmware protection that customers need.
The CEC1736 solution extends Microchip’s offering for ensuring the cyber resiliency of end equipment. It is a fully configurable real-time platform root of trust that enables runtime firmware protection in the SPI flash and I2C/SMBus filtering against runtime attacks. The attestation feature provides trustworthy evidence to ensure that critical devices in the platform are authentic. Lifecycle management and ownership transfer features protect secrets throughout the product lifecycle and during the transfer of product ownership, allowing different operators to use the system platform securely without compromising information.
The CEC1736 Trust Shield family’s advanced hardware crypto cipher suite is equipped with AES-256, SHA-512, RSA-4096, ECC with key size up to 571 bits and Elliptic Curve Digital Signature Algorithm (ECDSA) with a 384-bit key length. The 384-bit hardware Physically Unclonable Function (PUF) enables a unique root key, symmetric secret, private key generation and protection. The advanced root of trust and security solution, which meets the NIST 800-193 and OCP security guidelines, allows for a quick adoption of the latest security advances and standards.
High-performance IMU RS South Africa
Analogue, Mixed Signal, LSI
TDK Corporation has announced availability of the new InvenSense SmartMotion ICM-536xx family of high-performance 6-axis IMUs.
Read more...MCU for noisy environments EBV Electrolink
DSP, Micros & Memory
The MCX?E24X is a high-performance microcontroller family from NXP, engineered for industrial, automotive-like, and energy-focused environments.
Read more...SmartRAID 4300 Series Altron Arrow
DSP, Micros & Memory
Microchip’s disaggregated architecture leverages host CPU and PCIe infrastructure to overcome traditional storage bottlenecks in scalable, secure NVMe RAID storage solutions.
Read more...High-performance SDR range RFiber Solutions
DSP, Micros & Memory
Epiq Solutions offers high-performance RF tuners and software-defined radios with various specifications for diverse applications in congested environments.
Read more...Wide frequency range inductors RS South Africa
Passive Components
TDK Corporation has expanded its ADL4524VL series (4,5 x 2,4 x 2,6 mm – L x W x H) of wire-wound inductors for automotive power-over-coax.
Read more...High performance SDR design considerations RFiber Solutions
Editor's Choice DSP, Micros & Memory
As the spectrum gets increasingly crowded, and adversaries more capable, the task of examining wide bands and making sense of it all, while not missing anything, gets harder.
Read more...High-temperature closed-loop MEMS accelerometer RS South Africa
Analogue, Mixed Signal, LSI
This sensor from TDK is a high-temperature MEMS accelerometer with ±14 g input range and a digital interface for measurement while drilling applications.
Read more...Direct RF converters and FPGAs boost EW applications RFiber Solutions
DSP, Micros & Memory
The latest boost to electronic warfare designs comes from emerging FPGA architectures that combine advanced RF converters and high-performance processing engines in a single package.
Read more...1-Wire EEPROM with secure authenticator Altron Arrow
DSP, Micros & Memory
The DS28E54 secure authenticator combines FIPS 202-compliant secure hash algorithm (SHA-3) challenge and response authentication with secured electrically erasable programmable read-only memory.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.