In todays interconnected and globalized world, almost every electronic product and application is at risk to some kind of loss due to theft of information. The impact of this loss can take one or more of the following forms:
In the Internet of tomorrow, more and more devices will be connected to each other, bringing great utility to our daily lives, but also offering a myriad of opportunities for security breaches. As a long time investor in security technology, NXP® offers a broad portfolio of security solutions, from microcontrollers to high-performance multi-core communication processors. We are a leading provider of security technology for multiple applications from connected cars to data centers, healthcare to industrial control. Our expertise in security, built through decades of regular and deep investment in security, makes us a valuable partner when you are deciding the security requirements for your project.
NXP products use a combination of hardware and trusted firmware which OEMs use as a root of trust to create trusted systems. Trusted systems do what their stakeholders (OEMs, Service Providers, and Users) expect them to do and help prevent attacks such as:
Features for trusted systems include:
All embedded systems should implement trusted computing to provide a basic level of data and services security and integrity for their stakeholders. Intermediate and advanced trust architecture features are available to increase the complexity for the attacker and support application and market specific needs.
Systems will often look for patterns within network data to identify protocols or users so that appropriate security or QoS policies can be applied, or to identify attempted security breaches and attacks. For this purpose we use our own Pattern Matching Engine (PME), a type of regex hardware acceleration engine which scans data for patterns based on Regular Expression rules.
Cryptography is the science of encoding and decoding (enciphering/deciphering) data so that attackers cannot decode or undetectably modify the data. Cryptographic algorithms can be symmetric – both parties use a shared secret key to encode and decode data, or asymmetric – different, but mathematically related public and private keys are used to encode and decode.
High-level functions enabled by symmetric cryptography include:
High-level functions enabled by asymmetric cryptography include:
Cryptography is very computationally intensive. NXP products include crypto accelerators to support system latency and bandwidth requirements.