Authentication of FPGA bitstreams: why and how

  • Authors:
  • Saar Drimer

  • Affiliations:
  • Computer Laboratory, University of Cambridge, Cambridge, UK

  • Venue:
  • ARC'07 Proceedings of the 3rd international conference on Reconfigurable computing: architectures, tools and applications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality is useful. An examination of possible solutions is followed by suggesting a practical one in consideration of the FPGA's configuration environment constraints. The solution presented here involves two symmetric-key encryption cores running in parallel to provide both authentication and confidentiality while sharing resources for efficient implementation.