logo

CEPD News 
December, 2014 - Vol 7, Issue 3
 Happy Holidays from the staff of Colorado Electronic Product Design!
Join Our Mailing List!
In This Issue
IEEE Denver News
Embedded Security
Services
Quick Links




Society News

IEEE Denver is Presenting a Dine & Learn: 

Smart Grid Communications: 

Requirements and Challenges

by Salman Mohagheghi, Colorado School of Mines  

Date:January 13, 2015
Time:6:00pm - 9:00pm
Where:Rock Bottom Brewery in the "Promenade Room"
10633 Westminster Blvd #900
Westminster, CO 80020
MAP:Click here for Map 
Agenda:6:00 - 6:15 Registration and Appetizers
6:00 - 7:15 Dinner and Networking
7:30 - 9:00 Presentation
Please register by January 08, 2015 as space is limited!  (Click Here) 
Website:http://ieee-denver.org 

  

Design In Embedded Security

Many modern FPGAs and microcontrollers provide security features that design engineers should consider using.  Some of these include: tamper detection, one-time programmable memory, fused memory access and data stream encryption.  Each of these features has both strengths and weaknesses.  Typically, there is a trade-off between security and flexibility. 

 

One example is Altera's Cyclone IV FPGA, which offers security features to help ensure that valuable IP is not tampered with or intercepted.  SRAM-based FPGAs are volatile and require a configuration bit stream sent from a flash memory or configuration device to the FPGA at power-up. To prevent the configuration bit stream from being intercepted during transmission and to provide design security, Altera's FPGAs use the advanced encryption standard (AES) and a 128-bit or 256-bit key for configuration bit stream encryption. The secure configuration flow is carried out in three steps:

1.       The user-defined AES key is programmed into the volatile or non-volatile key storage.

2.       Quartus® II design software uses the same AES key to generate an encrypted configuration file, which is then stored in an external flash memory or configuration device.

3.       At power-up, the flash memory or configuration device sends the encrypted configuration file to the Altera® FPGA, which then uses the stored AES key to decrypt the file and configure itself 

 

For more reading on this topic, see:

Cyber Attacks

Wireless Devices Vulnerable to Hacking


 -NM

Services
If you would like help developing a new product or if you find your project understaffed, CEPD can help you meet your deadlines. Our staff draws on years of diverse product design experience to provide creative and timely solutions for your product needs. Some of our specialties include:
  • DSP
  • Embedded Systems Hardware and Software
  • Data Acquisition
  • Wireless Sensor and Telemetry Systems (Zigbee, Cellular, VHF, Bluetooth, ANT+, etc.)
  • Control Systems
  • Programmable Logic: FPGA / PLD
  • Analog Circuit Design
  • Switching Power Supply Design
  • Battery charging (all chemistries)
  • PCB Design and Layout
  • Analysis,Test and Documentation
Our goal is to provide cost effective and expedient design options for our clients. Our services range from an hour of consultation to large turn-key product development projects. We provide detailed proposals, accurate estimates and time schedules to help you manage each phase of the project. We can offer fixed cost or time and materials proposals to suit your specific needs. There is no cost to you for the initial proposal we create and the initial discussion required! 
Sincerely,

The Staff of CEPD, Inc.
© 2014, CEPD, Inc.             
 303 415-1112    Fax 720 306-4445