feature article
Subscribe Now

Security Is As Security Does

Following on from last week’s article about security and cryptography, this week we have a new product from CPU Tech. As the name might suggest, CPU Tech designs CPU chips. The twist is, this company’s chips have a high level of security built into them. As you also might guess, one of their big customers is your government.

CPU Tech starts with the familiar PowerPC processor architecture, so if you’re in the market for PowerPC chips, CPU Tech is worth a look for that reason alone. But the real excitement comes when you enable the on-chip security features. The processor is tamper- and virus- and hacker-resistant, and it includes all sorts of other features I’m not allowed to talk about.

Recognizing that good security is a system-wide issue, not just a chip feature, CPU Tech has also come out with its own development system for encrypting the software you create for its processor. After all, if the link between development system and target is compromised, who’s to say the finished product is actually secure?

It’s called the Acalis Sentry Server, and it’s a reasonably small box (smaller than a PC) with an incongruous-looking butterfly design on the front panel. The Sentry Server doesn’t take the place of your favorite hardware- or software-development system. Instead, you insert it into the link between software download and target hardware. The box verifies and encrypts the downloaded code, and it can be accessed only by authorized personnel.

As part of a secure system, Sentry Server seems like a necessary step. If you’re in that kind of market, check it out.

Leave a Reply

featured blogs
Jun 20, 2018
https://youtu.be/-fwwmFE6yUs Coming from Automotiv Elektronik Kongress (camera Robert Schweiger) Monday: Embargoed Tuesday: DAC day 1 Wednesday: DAC day 2 Thursday: DAC day 3 Friday: Embargoed www.breakfastbytes.com Sign up for Sunday Brunch, the weekly Breakfast Bytes email....
Jun 19, 2018
Blockchain. Cryptocurrencies. Bitcoin mining. Algorithmic trading. These disruptive technologies depend on high-performance computing platforms for reliable execution. The financial services industry invests billions in hardware to support the near real-time services consumer...
Jun 7, 2018
If integrating an embedded FPGA (eFPGA) into your ASIC or SoC design strikes you as odd, it shouldn'€™t. ICs have been absorbing almost every component on a circuit board for decades, starting with transistors, resistors, and capacitors '€” then progressing to gates, ALUs...
May 24, 2018
Amazon has apparently had an Echo hiccup of the sort that would give customers bad dreams. It sent a random conversation to a random contact. A couple had installed numerous Alexa-enabled devices in the home. At some point, they had a conversation '€“ as couples are wont to...
Apr 27, 2018
A sound constraint management design process helps to foster a correct-by-design approach, reduces time-to-market, and ultimately optimizes the design process'€”eliminating the undefined, error-prone methods of the past. Here are five questions to ask......