Atmel Crypto Elements Atmel Corporation
|
|
- Dorothy Martin
- 8 years ago
- Views:
Transcription
1 Atmel Crypto Elements Atmel Corporation
2 What about Security Atmel Corporation
3 Security Attacks in the News Can Atmel Help? YES! LIFX: Networked LED lamps betrayed Wi-Fi passwords 07/22/2014 Irina Hübner With the Internet of Things, completely new security issues that are grossly underestimated result.now it have white-hat hackers managed to identify the wireless key on networked LED lamps. security researchers have attacked the context of smart LED lamps of the US manufacturer LIFX. These can be switched on and off using a smartphone or tablet. In addition, the color and brightness on the mobile devices can be controlled. The LED lamps communicate with each other over 6LoWPAN and shall provide about each other's Wi-Fi access. Although they use the AES algorithm to encrypt the passwords. However, the key underlying is never changed, thereby making it attackers easy to figure out the desired data. To decrypt the wireless access, the so-called white-hat hackers had neither authenticated nor was noticed their presence on the network ktronik%2fledlighting%2fartikel%2f111302%2f&sandbox= Atmel Corporation
4 Internet as a Top Security Concern Heartbleed, Shellcock, Poodle, Anthem What s next? Shodan: The Scariest Search Engine on the Internet By David 1:41 p.m. ET April 8, 2015 Shodan navigates the Internet's back channels. It runs 24/7 and collects information on about 500 million connected devices and services each month. Countless traffic lights, security cameras, home automation devices & heating systems, connected to the Internet & easy to spot. Shodan searchers have found control systems for a water park, a gas station, a hotel wine cooler and a crematorium. Cybersecurity researchers have even located command and control systems for nuclear power plants and a particle-accelerating cyclotron by using Shodan. The biggest risk to a successful proliferation of IoT Edge Nodes is how much thinking, effort and resources developers are willing to invest in security when they define and design their product Atmel Corporation
5 Atmel Corporation
6 Atmel Corporation
7 Rogue software can see into memory. So, don t put important things there! Atmel Corporation
8 Atmel Corporation
9 Microprobers are Easy to Find Can purchase used equipment readily Doesn t require any special support use it in your kitchen Typically easy to run wires from working system to prober Atmel Corporation
10 Questions Do you see Copy's for YOUR product, batteries, consumables, extension boards on the market? Is YOUR brand / brand name important for you? Is YOUR product connected and able for Firmware upgrades? Do YOU want to prevent modifications of your Firmware. Do YOU trust a connected node e.g. sensor? Atmel Corporation
11 SmartConnect Security Messaging 4 major angles tackling IoT Security concerns Data-Link IP-Transport Service HW Key Storage Protection on the Wireless network Authenticate & Encrypt all wireless and IP packets. Local bad guy unlocks your front door from a van parked outside Protection on the Internet Authenticate & Encrypt contents of IP packets Internet bad guy unlocks your front door from North Dakota Protection of corporatelevel services Authenticate & Encrypt device identity and service. Bad guy spoofs software download to install software that leaves the front door unlocked. Protection from physically present hackers Hacker reads the keys off the physically present device, then inserts keys into the Device Identity, Data-Link, or IP-Transport protocol. Bad guy unlocks your front door while standing at the door. Security is only as strong as the weakest link Atmel Corporation
12 SmartConnect IoT Layered Security Solutions Offering best in Class Security for IoT Edge Nodes Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Wi-Fi APPLICATION HOMEKIT, OIC, HTTP, FTP, SMTP, SNMP, TLS/SSL TCP/UDP IP, ARP, DHCP Security Level CryptoAuthentication -> Storage of Keys / Certificates On-Chip (WINC1500) TLS 1.0 (SSL) -> Ensures Data Encryption Coming out of the LAN, also Known as Internet Security Layer 2: Link Layer 1: Physical Atmel Corporation b/g/n On-Chip (WINC1500) WEP, WPS, WPA2 Personal WPA2 Enterprise -> Ensures Data Encryption within the LAN to avoid intrusion
13 SmartConnect IoT Layered Security Solutions Offering best in Class Security for IoT Edge Nodes Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical 6LoWPAN / Thread APPLICATION CoAP, MQTT, Etc,.. UDP + DTLS TCP + TLS (not in Thread) IP 6LoWPAN (Thread) ContikiMAC Security Level CryptoAuthentication -> Authentication used for Anti-cloning, Ecosystem Management, Storage of Keys/Certificates On-Chip, HW/SW, mandatory (in Thread) DTLS 1.2 (EC-JPAKE) -> Authentication and key provisioning, Security outside of WPAN On-Chip, HW, mandatory AES-128 -> Basic Frame encryption Atmel Corporation
14 SmartConnect IoT Layered Security Solutions Offering best in Class Security for IoT Edge Nodes Layer 7: Application Layer 6: Presentation ZigBee APPLICATION ZCL Security Level CryptoAuthentication ATECC508A bundled -> Authentication Key Storage Layer 5: Session Layer 4: Transport Layer 3: Network ZigBee PRO On-Chip, HW, optional AES-128 On-Chip, HW, mandatory AES-128 Layer 2: Data Link Layer 1: Physical Atmel Corporation
15 SmartConnect IoT Layered Security Solutions Offering best in Class Security for IoT Edge Nodes Bluetooth SMART Security Level Layer 7: Application Application CryptoAuthentication ATECC508A bundled Layer 6: Presentation -> Authentication Key Storage Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link GAP SMP L2CAP GATT ATT Advanced Comm. Security BLE4.2 -> Enables Secure Connections -> Authentication with Key exchange. -> Association mode: Numeric Comparison HCI Link Layer Link Layer security BLE 4.X Layer 1: Physical Atmel Corporation Baseband + Radio -> Ensures Data Encryption within the Link to avoid intrusion -> Association mode: Just works, Passkey entry, Out of Band
16 Crypto Authentication and TPM Crypto elements with protected, hardware-based key storage work with any MCU to provide Confidentiality, data Integrity, & Authentication ECDSA Asymmetric ECDH Key Agreement supporting advanced algorithms SHA Symmetric Atmel Corporation Atmel Product Presentation - Q3 2015
17 Covering a wide range of applications To harden security at multiple layers Certified Hardware Requirements Access Point Security Gateway / Server / PC... MPU / TPM Gateway / POS Secure MPU Secur e MPU Connected Nodes Gateway / Server MPU / Connected Node Transport Layer Security MCU / MPU Wireless ATECC508A Accessories & Disposables Application Layer Security Challenge Response ATECC108A, ATECC508A, ATSHA204A, & ATAES132A Atmel Corporation Atmel Product Presentation - Q3 2015
18 Crypto Architecture Optimized for high security, ease-of-use and low cost Attackers cannot see what s inside Tamper-hardened Hardware Boundary Isolates any attack to a single device Standards based crypto engine between interface and memory ECC / SHA /AES Cryptographic Engine Unique Serial Number Monotonic Counters Secured EEPROM for keys & data Secured EEPROM High Quality Random Number Generator Tracks number of authentications I/O options simplify design in Multiple Serial I/O options Required for every crypto protocol Atmel Corporation
19 Hardware Security Features Strong Multi-Level HW Security: Active shield over entire chip All memories internally encrypted Data independent crypto execution Randomized math operations Internal state consistency checking Voltage tampers, isolated power rail Internal clock generation Secure test methods, no JTAG No debug probe points, no test pads No package or die identification Designed to Defend Against: Microprobe attacks Timing attacks Emissions attacks Faults, invalid command attacks Power cycling, clock glitches Partial personalization attacks ATMEL CryptoAuthentication Standard Devices Cannot achieve this level of security with software alone! Atmel Corporation
20 Portfolio with Complete Algorithm & Feature Mix High Security for Every Application, Use Case, Requirement ATSHA204A (SHA256-based Authentication) 4.5K bits secured storage (16 slots) Optimized for keys, secrets and configuration storage Very cost efficient ATECC108A (Asymmetric-key Authentication) No secrets in host more flexible usage 10K bits secured storage (16 slots) Well accepted from industrial customers Encryption Cryptographic Algorithms Hash ATAES132A(AES Authentication & Encryption) 32K bits secured storage (16 zones) Optimized for data storage, but includes 16 keys Examples: code, firmware, and biometric data ATECC Automotive ATECC108 automotive qualified version (development) Asymmetric- Key Symmetric- Key TPM AT97SC3204xxx & AT97SC3205xxx (Trusted Platform Module) In line to the TCG spec used in the PC world and more and more in the industrial world FIPS certified & CC EAL 4+ pending LPC, I2C & SPI available Atmel Corporation
21 7things you were not told about IoT 1. IoT will expose the difference between Smart devices and flat-out dumb. M2M vs. IoT. (Be aware of false starts) 2. Your new IoT product is DOA (Homekit?, OIC/All seen?, Thread? Others?) 3. One size does not fit all 4. Can you solve the HW puzzle? 5. Forget Big data, its all about small data now 6. Security: You get what you pay for 7. Scalability. IPV Atmel Corporation 06/05/2015
22 2012 Atmel Corporation. All rights reserved. Atmel, Atmel logo and combinations thereof, Enabling Unlimited Possibilities, and others are registered trademarks or trademarks of Atmel Corporation or its subsidiaries. Other terms and product names may be trademarks of others. Disclaimer: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN THE ATMEL TERMS AND CONDITIONS OF SALES LOCATED ON THE ATMEL WEBSITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS AND PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and products descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life Copyright Atmel Corporation
APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.
APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto
More informationApplication Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
More informationApplication Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction
Application Note Atmel Authentication Modes Prerequisites Hardware Atmel AT88CK454BLACK Evaluation Board Atmel AT88CK109STK8 Kit Software Atmel Crypto Evaluation Studio (ACES) Overview Understand which
More informationAPPLICATION NOTE. Authentication Counting. Atmel CryptoAuthentication. Features. Introduction
APPLICATION NOTE Authentication Counting Atmel CryptoAuthentication Features How to achieve high endurance counters in excess of 800,000 counts. How to disable the Atmel CryptoAuthentication ATSHA204A
More informationMore Secure, Less Costly IoT Edge Node Security Provisioning
More Secure, Less Costly IoT Edge Node Security Provisioning Authors: Nicolas Schieli, Sr. Director, Secure Products Group Ron Ih, Sr. Manager, Marketing and Business Development Eustace Asanghanwa, Manager,
More informationHow To Use Atmel'S Atmel Crypto Device For A Year On A Computer Or Cell Phone
Atmel Crypto Products Portfolio Family of Secure Authentication Solutions Atmel Crypto Products Portfolio The Atmel Crypto Products Portfolio offers full system security solution options for a wide variety
More informationAPPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features
APPLICATION NOTE AT16268: JD Smart Cloud Based Smart Plug Getting Started Guide ATSAMW25 Introduction This application note aims to help readers to get started with the Atmel smart plug reference design
More informationCryptoAuth Xplained Pro
CryptoAuth Xplained Pro CryptoAuthentication Xplained Pro Extension Board HARDWARE USER GUIDE Atmel CryptoAuth Xplained Pro Extension Board Introduction The Atmel CryptoAuth Xplained Pro (CAXPro) Evaluation
More informationAT88CK490 Evaluation Kit
AT88CK490 Evaluation Kit CryptoAuthentication USB Dongle HARDWARE USER GUIDE Atmel AT88CK490 CryptoAuthentication Evaluation Kit Introduction The Atmel AT88CK490 CryptoAuthentication Evaluation Kit is
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationInternet of Things. Opportunities for device differentiation
Internet of Things Opportunities for device differentiation What is the Internet of Things? The Internet of Things (IoT) is an emerging market trend impacting semiconductor devices, system OEMs, cloud
More informationSMARTCARD XPRO. Preface. SMART ARM-based Microcontrollers USER GUIDE
SMART ARM-based Microcontrollers SMARTCARD XPRO USER GUIDE Preface Atmel SMARTCARD Xplained Pro is an extension board to the Atmel Xplained Pro evaluation platform. Atmel SMARTCARD Xplained Pro is designed
More informationAPPLICATION NOTE. AT17284: Proximetry Cloud Based Smart Plug User Guide. SMART ARM-based Microcontrollers. Introduction. Features
APPLICATION NOTE AT17284: Proximetry Cloud Based Smart Plug User Guide SMART ARM-based Microcontrollers Introduction This document introduces the Proximetry cloud based Atmel Smart Plug. It explains how
More informationUSER GUIDE EDBG. Description
USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel
More informationHow To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or
APPLICATION NOTE Atmel AVR32848: Android Accessory Demo 32-bit Atmel Microcontrollers Features Control an accessory from an Android device Send data to and from an Android device to an accessory Supported
More informationAT88CK490 and AT88CK590
AT88CK490 and AT88CK590 Atmel CryptoAuthentication USB Dongle Demo-Evaluation Kits For ATSHA204A, ATAES132A, ATECC108A, and ATECC508A HARDWARE USER GUIDE Atmel CryptoAuthentication USB Dongle Demo-Evaluation
More informationThe software is sold on an AS IS basis. ALVARION, its affiliates or its licensors MAKE NO
NG_VG Integrated Wireless Home Gateway TECHNICAL SPECIFICATION * Temporary product name Legal Rights The material contained herein is proprietary, and owned by ALVARION Co., Ltd or its third party licensors.
More informationUSER GUIDE. ZigBit USB Stick User Guide. Introduction
USER GUIDE ZigBit USB Stick User Guide Introduction This user guide describes how to get started with the Atmel ZigBit USB sticks. The ZigBit USB sticks is targeted for evaluating the USB features of the
More informationAdministration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
More informationSecuring Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
More informationAtmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features.
Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2 Features Advantages Implementation differences Integration Migration from stack V1 to stack V2 8-bit Atmel Microcontrollers Application
More informationShort range low power wireless devices and Internet of Things (IoT)
Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses
More informationAPPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features
APPLICATION NOTE AT07175: SAM-BA Bootloader for SAM D21 Atmel SAM D21 Introduction Atmel SAM Boot Assistant (Atmel SAM-BA ) allows In-System Programming (ISP) from USB or UART host without any external
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationAVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationUsing AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
More informationAVR1922: Xplain Board Controller Firmware. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1922: Xplain Board Controller Firmware Features USB interface - Mass-storage to on-board DataFlash memory Atmel AVR XMEGA TM reset control 1 Introduction The Xplain board controller, an AT90USB1287,
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationAVR115: Data Logging with Atmel File System on ATmega32U4. Microcontrollers. Application Note. 1 Introduction. Atmel
AVR115: Data Logging with Atmel File System on ATmega32U4 Microcontrollers 01101010 11010101 01010111 10010101 Application Note 1 Introduction Atmel provides a File System management for AT90USBx and ATmegaxxUx
More information32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2
AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2 1. Introduction The purpose of this application note is to show how to compile any of the application and driver examples
More informationQuestions from The New SensorTag - IoT Made Easy Webinar
Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationInternet Protocol Support Profile
Bluetooth Specification Date 2014-Dec-16 Revision Group Prepared By Internet WG Feedback Email int-main@bluetooth.org Abstract: This Profile Specification proposes the support of exchanging IPv6 packets
More informationAPPLICATION NOTE Atmel AT02509: In House Unit with Bluetooth Low Energy Module Hardware User Guide 8-bit Atmel Microcontroller Features Description
APPLICATION NOTE Atmel AT259: In House Unit with Bluetooth Low Energy Module Hardware User Guide Features 8-bit Atmel Microcontroller Low power consumption Interface with BLE with UART Bi-direction wake
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationSecurity Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
More informationAtmel AVR4903: ASF - USB Device HID Mouse Application. Atmel Microcontrollers. Application Note. Features. 1 Introduction
Atmel AVR4903: ASF - USB Device HID Mouse Application Features USB 2.0 compliance - Chapter 9 compliance - HID compliance - Low-speed (1.5Mb/s) and full-speed (12Mb/s) data rates Standard USB HID mouse
More informationSecure Email. SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security
Secure Email SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security Softwar Choctaw Secure Email Application 2015 Softwar Inc. all rights reserved. CHOCTAW Secure Email application Choctaw provides
More informationCapacitive Touch Technology Opens the Door to a New Generation of Automotive User Interfaces
Capacitive Touch Technology Opens the Door to a New Generation of Automotive User Interfaces Stephan Thaler, Thomas Wenzel When designing a modern car, the spotlight is on the driving experience, from
More informationAT12181: ATWINC1500 Wi-Fi Network Controller - AP Provision Mode. Introduction. Features. Atmel SmartConnect APPLICATION NOTE
Atmel SmartConnect AT12181: ATWINC1500 Wi-Fi Network Controller - AP Provision Mode APPLICATION NOTE Introduction This application note explains how to build the state-of-art Internet of Things (IoT) applications
More information10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationUser Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationCisco TelePresence VCR MSE 8220
Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR
More informationAtmel SMART ARM Core-based Embedded Microprocessors
Atmel SMART ARM Core-based Embedded Microprocessors High Performance, Power Efficient, Easy to Use Atmel SMART SAMA5 ARM Cortex-A5 MPUs Core Sub-System Memory Connectivity Device Name Core VFPU / NEON
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationAPPLICATION NOTE. Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver. Atmel SAMD20. Description. Features
APPLICATION NOTE Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver Description Atmel SAMD20 This application note describes a method to connect an Atmel ATSAMD20E microcontroller to an Atmel
More informationUsing BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
More informationPrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
More informationCourse Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)
Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:
More informationAVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE
Atmel AVR 8-bit Microcontroller AVR151: Setup and Use of the SPI APPLICATION NOTE Introduction This application note describes how to set up and use the on-chip Serial Peripheral Interface (SPI) of the
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationSPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
More informationSecurity Features in Password Manager
Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,
More informationDell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationCyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
More informationSecurity Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
More informationAVR353: Voltage Reference Calibration and Voltage ADC Usage. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR353: Voltage Reference Calibration and Voltage ADC Usage Features Voltage reference calibration. - 1.100V +/-1mV (typical) and < 90ppm/ C drift from 10 C to +70 C. Interrupt controlled voltage ADC sampling.
More informationAVR1309: Using the XMEGA SPI. 8-bit Microcontrollers. Application Note. Features. 1 Introduction SCK MOSI MISO SS
AVR1309: Using the XMEGA SPI Features Introduction to SPI and the XMEGA SPI module Setup and use of the XMEGA SPI module Implementation of module drivers Polled master Interrupt controlled master Polled
More informationHow to Deploy Models using Statistica SVB Nodes
How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,
More informationIntel Trusted Platforms Overview
Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationMODFLEX MINI GATEWAY ETHERNET USER S GUIDE
MODFLEX MINI GATEWAY ETHERNET Last updated March 15 th, 2012 330-0076-R1.0 Copyright 2011-2012 LS Research, LLC Page 1 of 19 Table of Contents 1 Introduction... 3 1.1 Purpose & Scope... 3 1.2 Applicable
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationLife With Big Data and the Internet of Things
Life With Big Data and the Internet of Things Jim Fister Lead Strategist, Director of Business Development james.d.fister@intel.com www.linkedin.com/pub/jim-fister/0/3/aa/ Preston Walters Director, Business
More informationTypes of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
More informationOrganized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
More informationIntroducing a platform to facilitate reliable and highly productive embedded developments
Beyond the IDE Introducing a platform to facilitate reliable and highly productive embedded developments Author: Joerg Bertholdt, Director of Marketing, MCU Tools and Software, Atmel Corporation Beyond
More informationDell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
More informationDEP Documentation DEP Customer's Host Programmers Guidelines
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP Customer's Host Programmers Guidelines Version: 04.01 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/10 Version Management
More informationQuest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
More informationUnderstanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More information8-bit. Application Note. Microcontrollers. AVR282: USB Firmware Upgrade for AT90USB
AVR282: USB Firmware Upgrade for AT90USB Features Supported by Atmel FLIP program on all Microsoft O/S from Windows 98SE and later FLIP 3.2.1 or greater supports Linux Default on chip USB bootloader In-System
More informationWireless Field Data Backhaul
October 2014 Page 1 Smart Wireless Gateway 1552WU An Emerson Smart Solution integrates WirelessHART data from remote areas of your plant. Scalable Reduced cost Safer deployment Secure and reliable communications
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationContents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts
Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring
More informationRELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
More informationST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features
Trusted Platform Module (TPM) with I²C Interface Data brief Features Single-chip Trusted Platform Module (TPM) Embedded TPM 1.2 firmware I²C communication interface (Slave mode) Architecture based on ST19N
More informationAnnual review FLORENCE 2013. WP4 Network: prototypes
Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and
More informationRadius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationControl4 MyHome: Remote Access Configuration
Control4 MyHome: Configuration Document: DOC-00036 Revision: A Date: 01/09/2012 Page 1 of 22 Control4 MyHome: Configuration About Control4 Control4, a leading provider of the operating system for the smart
More informationTemperature & Humidity SMS Alert Controller
Temperature & Humidity SMS Alert Controller Version 7 [Windows XP/Vista/7] GSMS THR / GSMS THP Revision 110507 [Version 2.2.14A] ~ 1 ~ SMS Alarm Messenger Version 7 [Windows XP/Vista/7] SMS Pro series
More informationBest Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
More informationReducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
More informationLogging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
More informationNavigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationGetting Started Guide
Snap-Link Mobile allows you to monitor and control lights, security, audio, temperatures and webcams on handheld mobile devices, such as Smartphones, PDAs or other devices running Windows Mobile operating
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More information