We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest. Update Here
Stay in the loop with the latest from Microchip. Update your profile while you are at it. Update Here
Complete your profile to access more resources. Update Here

Military-Grade Security by Design™

Comprehensive Security Architecture


Security begins with hardware. PolarFire FPGAs and SoC FPGAs deliver military-grade protection, from design through field deployment and end-of-life, featuring:

  1. Cryptographically controlled supply chain:
    • Cryptographic authentication at every step during the manufacturing flow prevents cloning and enables authentic products get built and delivered
    • Device Integrity Value (DIV): You can verify the authenticity of the device procured and through the lifecycle of your system
  2. NIST-certified crypto accelerators:
    • NIST Cryptographic Algorithm Validation Program (CAVP)-certified algorithms provide compliance to standards, which enables interoperability and robust security
    • Hardened crypto engines provide deterministic performance and lifelong reliability
  3. PUF and hardware root of trust:
    • Physically Unclonable Function (PUF) generates unique device-specific keys establishing a hardware root of trust for key storage and secure boot
  4. DPA countermeasures:
    • Side-channel attack resistance with Rambus’ patent-protected Differential Power Analysis (DPA) countermeasure portfolio; Cryptography Research, Inc. (CRI) pass-through license that enables you to implement side-channel-resistant solutions

 

Our design security allows FPGA designs to operate as intended for the life of the product, while protecting intellectual property against theft, cloning or tampering.

Key Features

  • 32 built-in anti-tamper flags
    • Monitor voltage, temperature, clock frequency and clock anomalies
    • Active tamper mesh detects probing and invasive attacks
    • JTAG security monitor prevents unauthorized debug access
    • User-selectable tamper response mechanisms, including zeroization of keys and entire design
  • Bitstream security
    • AES-256 Bitstream Encryption and Secure Hash Algorithm (SHA)-based authentication guarantee that only trusted designs can be loaded
    • On-chip Nonvolatile Memory (NVM) confirms no external bitstream and no opportunity for interception
  • 14 device locks
    • Prevent overwriting user keys or security segments
    • Disable debug features (SmartDebug, boundary scan, sensor readout, custom JTAG)
    • Permanently disable factory test modes with passcode
    • Use permanent locks to create an OTP/ASIC-like device
    • Disable JTAG/SPI programming and in-application programming
    • Lock FPGA or sNVM updates (override only with FlashLock passcode)
  • Secure NVM 
    • Up to 56 KB of secure NVM
    • Pages can be encrypted with PUF-derived keys

PolarFire FPGAs and SoC FPGAs Lead in Anti-Tamper Features 

PolarFire FPGAs and SoC FPGAs include a number of built-in tamper detection and response capabilities that can be used to enhance the security of the device. These countermeasures are intended to address various types of attacks that include non-invasive, semi-invasive, and invasive attacks. The devices can detect a number of conditions that may indicate an attempt to tamper.

PolarFire FPGA and SoC FPGA data security features extend protection beyond configuration and IP, securing application data in motion and at rest.

Key Features

  • Crypto co-processor (Athena F5200B): Hardened co-processor for Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA), and Hash-based Message Authentication Code (HMAC) techniques
    • Offload crypto functionality to co-processor for DPA resistance, CAVP-certified algorithms, power- and cost-efficient cryptography
  • Random number generator: Integrated TRNG enables secure cryptographic operations 
  • PUF-protected key storage: Keys derived uniquely per device, never exposed externally

PolarFire Security Leadership


Feature PolarFire SoC FPGA Capabilities Competitor 1 Competitor 2 Competitor 3
TRNG Hard-IP (SP800-90A CTR_DRBG-256; SP800-90B (draft) NRBG) × × Soft-IP
AES AES-128/192/256 (ECB, CBC, CTR, OFB, CFB, GCM, KeyWrap) AES-256 (CBC) AES-256 (CBC) AES-256 (ECB, GCM)
SHA SHA-1/224/256/384/512, Key Tree SHA-256 SHA-256 SHA-384
HMAC HMAC-SHA-1/224/256/384/512; GMAC-AES; CMAC-AES HMAC-SHA2-256 HMAC-SHA2-256 ×
RSA SigGen (ANSI X9.31, PKCS v1.5), SigVer (ANSI X9.31, PKCS v1.5) – 1024/1536/2048/3072/4096 Soft-RSA (2048)
SigGen (PKCS v1.5)
SigVer (PKCS v1.5)
Soft-RSA (2048)
SigGen (PKCS v1.5)
SigVer (PKCS v1.5)
Software library:
RSA primitive (2048)
ECDSA KeyGen, KeyVer, SigGen and SigVer – NIST and Brainpool (P256/384/521); KAS – ECC CDH, PKG, PKV × × ×
FFC KAS – DH, DSA SigGen and SigVer (1024/1536/2048/3072/4096) × × ×
Tamper Sense Voltage, temperature, clock frequency, clock glitch, active mesh × × Only voltage and temperature
PUF PUF protection for secure key storage (secure boot and data communication) × × For secure boot key
Bitstream Protection DPA-resistant encrypted bit-stream programming × ×

PolarFire SoC FPGAs extend hardware trust into the software domain. Built on the industry’s first RISC-V®-based SoC FPGA platform, our embedded security establishes root of trust for embedded systems.

Key Features

  1. Secure boot, rooted in hardware
    • Boot chain anchored in immutable Flash and PUF-derived keys
    • Firmware payloads—bootloader, operating system and application—are authenticated before execution
    • Prevents unauthorized or malicious code from execution
  2. Physical Memory Protection (PMP) and Memory Protection Unit (MPU)
    • PMP (in the RISC-V cores) and MPU (in the Microprocessor Subsystem (MSS) enforce access rules in hardware and software
    • Enable secure partitioning between trusted and non-trusted software
    • Support mixed-critical systems where real-time control and open-source Linux® applications run side by side without loss of determinism
  3. Secure crypto partitioning
    • Hardware crypto engines can be allocated exclusively to trusted domains
    • Shared-MSS and fabric crypto modes give developers flexibility in assigning cryptographic workloads to different trust levels
  4. Runtime tamper response 
    • Integrated with hardware monitors: if tamper is detected, subsystems can trigger zeroization, lockdown or safe reset

Benefits

  • Assured software authenticity: Applications only run if verified by the hardware root of trust
  • Partitioned security: Developers can isolate sensitive control functions from higher level Linux workloads
  • Defense against runtime attacks: Memory protection and tamper responses prevent privilege escalation and key leakage

 

 

Our Secure Production Programming Solution (SPPS) enables you to deploy cryptographic control to your production flow at the:

Design Site (key functions):

  1. Define the programming request (e.g., 5,000 devices).
  2. Libero® SoC Design Suite Job Manager generates the bitstream.
  3. Hardware Security Module (HSM) generates keys, encrypts the bitstream, and sets device count—an encrypted job file is returned.

Manufacturing Site (key functions):

  1. Contract manufacturers load the encrypted job file into the system
  2. HSM decrypts the file, checks device limits and generates an authorization code
  3. Authorization code is passed back to programming tools
  4. Libero SoC Design Suite Job Manager/FlashPro Express unwraps the encryption key
  5. Bitstream is decrypted and programmed securely

Benefits of SPPS

  • Separation of roles: Designers retain key control; manufacturers never see them
  • Device count enforcement: Stops overbuilding and cloning
  • HSM-based security: Keys generated and handled only inside a certified security modules
  • Auditability: Certificates of compliance provide lifecycle traceability

Security Documentation


Supporting Collateral

PolarFire Family FPGA Security User Guide
PolarFire Family System Services User Guide
FPGA Programmed Content Integrity Checking and Programming File Tracking using Cryptographic Digests
PolarFire Family Programming User Guide
UG0881: PolarFire SoC FPGA Booting and Configuration User Guide
AN4591: PolarFire FPGA Implementing Data Security Using User Cryptoprocessor Application Note
AC473: PolarFire FPGA: Implementing Data Security using UserCrypto Processor - Splash Kit Application Note
Overview of Design Security Using Microchip FPGAs and SoC FPGAs
Introduction to the SmartFusion2 and IGLOO2 Security Model
SmartFusion 2 and IGLOO 2 FPGA Security and Best Practices User Guide (Earlier UG0443)
Specify and Program Security Settings and Keys with SmartFusion2 and IGLOO2 FPGAs
Overview of Secure Boot with Microsemi IGLOO2 FPGAs
AC253: Fusion Security Application Note
AC185: Implementation of Security in ProASIC and ProASIC PLUS® Flash-Based FPGAs
Implementation of Security in Microchip Antifuse FPGAs
CRI DPA Patents and Applications List

PolarFire FPGA and SoC FPGA Security Features


Feature PolarFire FPGA PolarFire SoC RT PolarFire FPGA RT PolarFire SoC
Non-volatile Configuration
SRAM-PUF Root Key
Bitstream Encryption/Auth
DPA/Side-Channel Resistance
Anti-Tamper Mesh/Sensors
Secure Boot    
PMP / MPU    
Quad RISC-V  (Linux+RTOS+Bare Metal)    
User Cryptoprocessor
TRNG
SPPS Scure Provisioning
Device Integrity Certification
SEU Immunity
Radiation-Tolerant    

Live Chat

Need Help?

Privacy Policy