Contact Us Now!

The latest innovation in RoT device security is GOWIN’s SecureFPGATM, which combines the advantages of an MCU and FPGA with the security functions needed for edge, IoT and Server applications.
SecureFPGA provides a security library based on SRAM PUF technology with GOWIN genuine device authentication designed to eliminate attacks from the factory floor to the daily use of the end product.
The included security library also provides commonly used security functions making it easy to add protection to any current MCU or FPGA project
Features
SecureFPGA products provide a hardware Root of Trust based on PUF (Physically Unclonable Function) technology. PUFs use the behavior of SRAM to differentiate chips from each other. They are virtually impossible to duplicate, clone or predict. This makes them very suitable for applications such as secure key generation and storage, device authentication, flexible key provisioning and chip asset management. Each device is factory provisioned with a unique key pair that is never exposed outside of the device.
The Intrinsic ID BroadKey-Pro Security library is provided with GOWIN SecureFPGA devices allowing easy integration of common security features into user applications. These features allow users to create unique device identifiers, generate/verify signatures for secure boot and encrypt/decrypt data.
The following video demonstrates how SecureFPGA can be used to protect private keys and user data in a MQTT cloud connectivity example. The demonstration uses SecureFPGA to protect the device keys by encrypting and decrypting them. Using this method no user keys can be tampered with in flash as they are only available after power up by decrypting them using the devices PUF generated root key pair.
Click the image to watch the video and learn more!
The following block diagram illustrates the cloud connectivity demonstration shown and described in the video. The demonstration uses AWS IoT as an MQTT broker. Alibaba cloud, Microsoft Azure and other MQTT brokers can also be used easily. On power up the private key associated with the AWS IoT "thing" is decrypted using the PUF generated device root key pair. After that the AWS credentials are validated and communication is established to the broker and other devices on the MQTT "topic."
Secure FPGA Demonstration – MQTT Cloud Connectivity and IoT Device Communication Demo
Reference Manual | Gowin_EMPU_M1 Hardware Design Reference Manual | Download |
Reference Manual | Gowin EMPU M1 Software Programming Reference Manual | Download |
Reference Manual | Gowin_EMPU_M1 IDE Software Reference Manual | Download |
User Guide | Gowin_EMPU(GW1NS-4C) Hardware Design Reference Manual | Download |
User Guide | Gowin_EMPU(GW1NS-4C) Software Programming Reference Manual | Download |
User Guide | Gowin_EMPU(GW1NS-4C) IDE Software Reference Manual | Download |
User Guide | GOWIN MCU Designer User Guide | Download |
Data Sheet | GW1NSER series of SecureFPGA Products Datasheet | Download |
Data Sheet | GW1N Series of FPGA Products Data Sheet | Download |
Release Note | GOWIN SecureFPGA Release Note | Download |
User Guide | GOWIN SecureFPGA IP User Guide | Download |
Software | Gowin secureFPGA(IID and SHA3)SDK | Download |
User Guide | Gowin SecureFPGA Software Development Kit | Click Here |
Software | GOWIN EDA FPGA Software Integrated Development Environment | Click Here |
Software | Gowin Security FPGA Product GW1NSER-4C Software Development Kit | Click Here |
Software | Gowin Security FPGA Product GW1NE-9C Software Development Kit | Click Here |