In order to optimize your browsing experience we uses cookies. You agree to the usage of cookies when you browsing this site.
For more information regarding cookies and the processing of your personal data please read our Privacy Policy.
I understand
inner_banner_market
MARKET
Accelerate Customers Innovation
Interested in our service?
Contact Us Now!
SecureFPGA

The latest innovation in RoT device security is GOWIN’s SecureFPGATM, which combines the advantages of an MCU and FPGA with the security functions needed for edge, IoT and Server applications. 

 

SecureFPGA provides a security library based on SRAM PUF technology with GOWIN genuine device authentication designed to eliminate attacks from the factory floor to the daily use of the end product.

 

The included security library also provides commonly used security functions making it easy to add protection to any current MCU or FPGA project

 

Features

SecureFPGA products provide a hardware Root of Trust based on PUF (Physically Unclonable Function) technology.  PUFs use the behavior of SRAM to differentiate chips from each other. They are virtually impossible to duplicate, clone or predict. This makes them very suitable for applications such as secure key generation and storage, device authentication, flexible key provisioning and chip asset management.  Each device is factory provisioned with a unique key pair that is never exposed outside of the device.

 

 

 

 The Intrinsic ID BroadKey-Pro Security library is provided with GOWIN SecureFPGA devices allowing easy integration of common security features into user applications. These features allow users to create unique device identifiers, generate/verify signatures for secure boot and encrypt/decrypt data.

      

 

 

The following video demonstrates how SecureFPGA can be used to protect private keys and user data in a MQTT cloud connectivity example. The demonstration uses SecureFPGA to protect the device keys by encrypting and decrypting them. Using this method no user keys can be tampered with in flash as they are only available after power up by decrypting them using the devices PUF generated root key pair.

 

 Click the image to watch the video and learn more!

 

The following block diagram illustrates the cloud connectivity demonstration shown and described in the video.  The demonstration uses AWS IoT as an MQTT broker.  Alibaba cloud, Microsoft Azure and other MQTT brokers can also be used easily.  On power up the private key associated with the AWS IoT "thing" is decrypted using the PUF generated device root key pair.  After that the AWS credentials are validated and communication is established to the broker and other devices on the MQTT "topic."

 

 

Secure FPGA Demonstration – MQTT Cloud Connectivity and IoT Device Communication Demo

Self Photos / Files - FPGA8

Documents Download
Reference Manual Gowin_EMPU_M1 Hardware Design Reference Manual Download
Reference Manual Gowin EMPU M1 Software Programming Reference Manual Download
Reference Manual Gowin_EMPU_M1 IDE Software Reference Manual Download
User Guide Gowin_EMPU(GW1NS-4C) Hardware Design Reference Manual Download
User Guide Gowin_EMPU(GW1NS-4C) Software Programming Reference Manual Download
User Guide Gowin_EMPU(GW1NS-4C) IDE Software Reference Manual Download
User Guide GOWIN MCU Designer User Guide Download
Data Sheet GW1NSER series of SecureFPGA Products Datasheet Download
Data Sheet GW1N Series of FPGA Products Data Sheet Download
Release Note GOWIN SecureFPGA Release Note Download
User Guide GOWIN SecureFPGA IP User Guide Download
Software Gowin secureFPGA(IID and SHA3)SDK Download
User Guide Gowin SecureFPGA Software Development Kit
Software GOWIN EDA FPGA Software Integrated Development Environment
Software Gowin Security FPGA Product GW1NSER-4C Software Development Kit
Software Gowin Security FPGA Product GW1NE-9C Software Development Kit
Contact Sample