NXP & Security Innovation Encryption for ARM MCUs



Similar documents
Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Secure Network Communications FIPS Non Proprietary Security Policy

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

CRYPTOGRAPHY IN NETWORK SECURITY

Savitribai Phule Pune University

Overview. SSL Cryptography Overview CHAPTER 1

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

EDA385 Embedded Systems Design. Advanced Course

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

SPINS: Security Protocols for Sensor Networks

Pulse Secure, LLC. January 9, 2015

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

IT Networks & Security CERT Luncheon Series: Cryptography

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

UM0586 User manual. STM32 Cryptographic Library. Introduction

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Table of Contents. Bibliografische Informationen digitalisiert durch

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Lecture 9: Application of Cryptography

Computer System Management: Hosting Servers, Miscellaneous

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

CSE/EE 461 Lecture 23

SECURITY IN NETWORKS

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Waspmote Encryption Libraries. Programming guide

Key Management Interoperability Protocol (KMIP)

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

As enterprises conduct more and more

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Security Policy for Oracle Advanced Security Option Cryptographic Module

INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003

A Standards-based Approach to IP Protection for HDLs

CS 758: Cryptography / Network Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Guide to Data Field Encryption

Network Security Technology Network Management

APPLICATION NOTE. Atmel AT02333: Safe and Secure Bootloader Implementation for SAM3/4. Atmel 32-bit Microcontroller. Features.

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CSCE 465 Computer & Network Security

Chapter 10. Network Security

Authentication requirement Authentication function MAC Hash function Security of

Chapter 8. Network Security

An Introduction to Cryptography as Applied to the Smart Grid

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Communication Security for Applications

AN3270 Application note

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Hash Functions. Integrity checks

, ) I Transport Layer Security

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

IoT Security Platform

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Introduction to Cryptography

Client Server Registration Protocol

Cryptography & Digital Signatures

An Introduction to Cryptography and Digital Signatures

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Cryptography & Network Security

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Fighting product clones through digital signatures

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

Network Security. Modes of Operation. Steven M. Bellovin February 3,

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Encryption Libraries

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Evaluation of the RC4 Algorithm for Data Encryption

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Public Key Encryption and Digital Signature: How do they work?

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

FIPS Level 1 Security Policy for Cisco Secure ACS FIPS Module

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS155. Cryptography Overview

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

How To Encrypt Data With Encryption

SecureDoc Disk Encryption Cryptographic Engine

ETSI TS V1.2.1 ( )

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Public Key Cryptography Overview

Secure Sockets Layer

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Transcription:

NXP & Security Innovation Encryption for ARM MCUs

Presenters Gene Carter- International Product Manager, NXP Semiconductors Gene is responsible for marketing of the ARM7 and Cortex-M3 microcontrollers. He has worked in the semiconductors industry for 15 years; 12 of those years with Philips/NXP. Gene holds a BSEE from Tufts University and an MBA from the University of Southern California. Peter Jenney - VP of Product Management, Security Innovation Pete leads all product management and strategy for the company's software security products. Pete received his B.A. degree from the University of Massachusetts.

AGENDA About NXP, ARM controllers, and Security Innovation Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Why ARM? 32-bit market is rapidly outgrowing the 8/16-bit markets ARM-based MCUs are rapidly outgrowing 32-bit market 140% CAGR Expanding ARM connected community for Tool/Software support Volume (M's) 70 60 50 40 30 20 WW Shipments of ARM technology-based MCUs 10 0 Q105 Q205 Q305 Q405 Q106 Q206 Q306 Q406 Q107 Q207 Q307 Q407 Q108

Why NXP s ARM Microcontrollers? ARM vendors start with the same ARM IP Cores, Internal Bus, Interrupt Controllers, etc But the end result is not the same! Architectural choices, implementation, processing optimization, and power management make a big difference MCU supplier implementation impacts performance, power consumption and ease of use Examples: Flash memory performance Peripheral consistency Integration Debugging capabilities

Broadest ARM Core Portfolio

Family Overview

LPC2000 Family (ARM7)

LPC3000 Family (ARM9)

Changing the MCU Landscape Best Product of 2009: Embedded System & IC LPC213x (2003) LPC210x (2005) LPC24xx (2007) LPC17xx (2009)

Customer Requirements Some embedded designers desire sophisticated encryption for even lowcost applications that may be carrying or transmitting sensitive information. Key security benefits achieved via an implementation of software encryption schemes are: Confidentiality - allows the sender and receiver to be sure that the information being shared only in the way they intend Authentication - allows the receiver of the information to be certain where it came from Integrity allows the receiver to verify that the message has not been altered in transit

The NXP & Security Innovation/NTRU Solution The NTRU software security libraries for NXP ARM microcontrollers provide the user the tools to achieve the benefits and features of encryption and include encryption and decryption of messages, digital signatures, and utilities protocols like key negotiation in an inexpensive and flexible manner Encryption algorithms work on the smallest ARM7 LPC2000 through to our ARM926 LPC3000 microcontrollers Allows customers who need short time-to-market to leverage Ntru s encryption expertise on their products quickly and efficiently Customers can update the software in the field to keep ahead of hackers and protect their IP

About Security Innovation Specialists in application and data security Help organizations like EMC, Tyco, Motorola and Sony build more secure software systems Acquired NTRU *, a next-generation cryptography firm, in August of 2009. NTRU's cryptography is preferred in the telecommunications and embedded markets due to its size, speed and flexibility Built strategic partnership with NXP to build encryption libraries specific to the ARM 7/ARM 9 microcontrollers Headquartered in Wilmington, MA * Ntru is short for N-th degree truncated polynomial ring, or in mathematical notation: R[x] / (xn 1)

AGENDA About NXP, ARM controllers and Security Innovation encryption Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Cryptography Types Symmetric Key aka Block Cipher Used to bulk encrypt Data n:n size ratio Same key used to encrypt & decrypt Data Asymmetric Key aka Public Key Best used to encrypt secret keys for transmission > n:n ratio Asymmetric key pairs used to encrypt/decrypt Digital Signature Used to verify an individual is who they say they are Message Digest Used to verify that data is not corrupted or tampered with

Sharing Data - Symmetric Key Both point A and point B know the secret Point A RISK Someone else gets the key and can access the data Symmetric Key Clear Data Cipher Encrypted Data Point B Symmetric Key Example Symmetric Algorithms: AES DES Triple DES Encrypted Data Decipher Clear Data

Sharing Data Public Key Neither point A nor point B know the complete secret Point A RISK Minimized But PKI overhead is large BIG KEYS, Slower Processing Recipients Public Key Cipher Clear Data Cipher Encrypted Data Point B Example Asymmetric Algorithms: Recipients Private Key RSA ECC NTRU Encrypted Data Decipher Clear Data 18

Safely Sharing Data Point A Recipients Public Key RISK Minimized Big PKI overhead is minimized by only encrypting the Asymmetric Key Symmetric Key Cipher Encrypted Symmetric Key Clear Data Cipher Encrypted Data Point B Sender Step 1: Block Encrypt Data Step 2: Encrypt Block Key Step 3: Transfer Data Step 4: Transfer Key Receiver Step 1: Receive Key Step 2: Receive Data Step 3: Decrypt Key Step 4: Decrypt Data Encrypted Symmetric Key Recipients Private Key Decipher Encrypted Data Symmetric Key Decipher Clear Data 19

Hashing Transfer Data Calculate Hash for Data to Send Calculate Hash for Data Receive = A = B A A Transfer Hash A = B Data Consistent A B Data Corrupt or Tampered with

AGENDA About NXP, ARM controllers, and Security Innovation Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Why Software for Encryption? A software implementation of an encryption scheme provides the benefits of flexibility, speed of implementation, and lower cost over time. Having encryption in software provides the ability to modify product design and/or product security without the need to make expensive changes in hardware and the potential resulting changes to the manufacturing process. More importantly, the NXP ARM microcontrollers feature In Application Programming (IAP) and the popular LPC2300 and LPC2400 series also feature Ethernet, USB and CAN IAP allows customers to periodically change the security algorithm in the field whether or not the product has been comprised Competitive hardware encryption cannot be updated without replacing the microcontroller, which is costly and complicated

Software advantages vs Hardware Cost-effective: software encryption doesn t require additional circuitry. The use of software encryption shortens design cycles, improves reliability, and lowers deployment costs Battery lifetime: software encryption runs on the main processor, unlike a hardware coprocessor which draws additional power. Use of software encryption extends battery lifetime. Performance and Flexibility: software encryption can match the performance of hardware encryption on some other MCUs but by giving customers the flexibility to make changes on installed applications without costly recalls Regulatory: Government export control rules do not apply until the MCU is programmed with the encryption software The NTRU software + NXP ARM MCUs offers customers the first general purpose ARM with encryption, Ethernet, USB and other communication peripherals

AGENDA About NXP, ARM controllers, and Security Innovation Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Dangers of communication via plain text It s all about C.I.A. -- Plain text offers none Confidentiality - allows the sender and receiver to be sure that the information being shared only in the way they intend Integrity allows the receiver to verify that the message has not been altered in transit Authentication - allows the receiver of the information to be certain where it came from

AGENDA About NXP, ARM controllers, and Security Innovation Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Requirement when reading data or code Encryption and Decryption of Messages allows the sender and receiver to be sure that the information is being shared only in the way they intend Encryption and Decryption of Keys allows the sender and receiver to be sure that the secret is being shared only in the way they intend Digital signatures allows the receiver to verify that the message has not been altered in transit. Secure transmission requires multiple activities to ensure the data is securely transferred and that it gets to the proper person intact

AGENDA About NXP, ARM controllers, and Security Innovation Demystifying Cryptography Benefits of software-based encryption Dangers of communication via plain text Encrypting communications when reading data or code from off-chip memory NXP encryption libraries implementation details and tips

Security Innovation NXP Crypto Library Security Innovation Crypto for NXP is all hand crafted assembler Provides the highest possible performance Provides the highest possible on chip flexibility Small Footprint 2164-6092 bytes depending on function High Throughput All functions optimized for speed High Reliability Not open source, professionally developed and maintained

Encryption suite components Hash algorithms SHA-1 MD5 Symmetric-key encryption/decryption AES 128, 192, 256 Triple-DES (64 x 3) Modes (ECB, CBC, CTR, ) Asymmetric-key encryption/decryption RSA 1024, 2048 Diffie-Hellman 1024, 2048 Digital Signature RSA, DSA Random Number Generator X9.82 Library is granular, customers can choose the encryption components that best fit their application s requirements

Flash sizes for each Library

Throughputs CT = CipherText (encrypt + authenticate) AD = Associated Data (authenticate only)

Throughputs (continued)

Example application structure encryption SENDER: Allocate memory buffers Create and seed Random Byte Generator Generate AES-CCM key Generate AES-CCM nonce Set AES-CCM MAC length (typically 8 or 16 bytes) Obtain receiver s RSA public key Storage & transmission of public keys is managed externally to the suite Encrypt AES-CCM key with receiver s RSA public key Encrypt and authenticate message using: AES-CCM key AES-CCM Nonce AES-CCM MAC length Send RSA ciphertext This is the encrypted AES-CCM key AES-CCM nonce AES-CCM MAC length AES-CCM ciphertext + length This is the encrypted message RECEIVER: Allocate memory buffers Receive RSA ciphertext This is the encrypted AES-CCM key AES-CCM nonce AES-CCM MAC length AES-CCM ciphertext + length This is the encrypted message Use receiver s RSA private key to decrypt RSA ciphertext and recover AES-CCM key Reject message if this fails Storage of RSA private key is managed externally to the suite Decrypt and check authentication on message Use AES-CCM with inputs: AES-CCM nonce AES-CCM MAC length AES-CCM ciphertext + length Reject message if this does not return success Output decrypted message No need to use Random Byte Generator

Example application structure signing SENDER: Allocate memory buffers Hash message with SHA-1 Use RSA private key to sign hash Storage of RSA private key is managed externally to the suite Send Message Signature No need to use Random Byte Generator RECEIVER: Allocate memory buffers Receive Message Signature Obtain sender s RSA public key Storage & transmission of public keys is managed externally to the suite Hash message with SHA-1 Verify signature using RSA Inputs are: Message Signature RSA public key Reject message if this does not return success Output message No need to use Random Byte Generator

Sample RSA-1024 Encrypt/Decrypt /********************************************************* * Test valid RSA-1024 encryption and decryption * *********************************************************/ /* Keys */ uint8_t const n_1024[] = { /* */ }; uint8_t const e[] = { /* */ }; uint8_t const sk_1024[] = { /* */ }; /* Data */ uint8_t const m[] = { /* */ }; uint8_t dec_m[128-11]; uint32_t dec_m_byte_len = sizeof(dec_m); uint8_t c[128]; uint32_t e_working_buf[215]; uint32_t d_working_buf[96]; uint32_t retcode; /* seed random number generator */ if ((retcode = nacl_drbg_seed(e_working_buf, seed))!= NACL_SUCCESS) { /* handle error */ } /* encrypt a short message */ if ((retcode = nacl_rsa_encrypt(m, sizeof(m), n_1024, 128, e, sizeof(e), e_working_buf, c)) } /* handle error */!= NACL_SUCCESS) { /* decrypt the ciphertext */ if ((retcode = nacl_rsa_decrypt(c, 128, sk_1024, d_working_buf, dec_m, } /* handle error */ &dec_m_byte_len))!= NACL_SUCCESS) { Notes All functions return an error code (success == NACL_SUCCESS = 0) Public encryption key is the pair (n_1024, e) Private decryption key is the structure sk_1024 check_plaintext is essentially a friendly name for memcmp All memory is allocated externally to the library c: ciphertext buffer (size depends on RSA key size) dec_m: output decrypted message buffer (size depends on RSA key size and padding size) e_working_buf, d_working_buf: scratch memory used by libraries Random byte generator must be seeded creation of the seed from a random source is external to the suite /* make sure the message retrieved is equal to the original one */ check_plaintext(dec_m, dec_m_byte_len, m, sizeof(m));

Sample RSA-2048 Sign/Verify /***************************************************** * Test valid RSA-2048 signing and verification * *****************************************************/ /* Keys */ uint8_t const n_2048[] = { /* */ }; uint8_t const e[] = { /* */ }; uint8_t const sk_2048[] = { /* */ }; /* Data */ uint8_t const h[] = { /* */ }; uint8_t s[256]; uint32_t s_working_buf[192]; uint32_t v_working_buf[256]; uint32_t retcode; /* sign a message hash */ if ((retcode = nacl_rsa_sign(256, h, sizeof(h), sha1_asn_id, sizeof(sha1_asn_id), sk_2048, s_working_buf, s))!= NACL_SUCCESS) { /* Handle error */ } /* verify the (message hash, signature) pair */ if ((retcode = nacl_rsa_verify(s, h, sizeof(h), sha1_asn_id, sizeof(sha1_asn_id), n_2048, 256, e, sizeof(e), v_working_buf))!= NACL_SUCCESS) { /* Handle error */ } /* flip a byte of the signature, and attempt to verify it */ s[10] ^= 0xff; if ((retcode = nacl_rsa_verify(s, h, sizeof(h) sha1_asn_id, sizeof(sha1_asn_id), n_2048, 256, e, sizeof(e), v_working_buf))!= NACL_INVALID_SIGNATURE) { /* Handle error */ } Notes All functions return an error code (success == NACL_SUCCESS = 0) Random Byte Generator need not be seeded Sign takes: Message hash Private signing key (the structure sk_2048)) Public modulus, n_2048 ID for the hash function Verify takes: Signature Message hash Public verification key (the pair (n_2048, e)) If message, signature, or verification key has been altered, verify returns NACL_INVALID_SIGNATURE All memory is allocated externally to the library s: signature buffer (size depends on RSA key size) s_working_buf, v_working_buf : scratch memory used by libraries

Sample AES-CCM Encrypt/Decrypt /********************************************************* * Test valid AES-CCM encryption and decryption * *********************************************************/ /* Keys */ uint8_t const key[16] = { /* */ }; uint32_t enc_rk[44]; uint32_t dec_rk[44]; /* Data */ uint8_t const nonce[]= { /* */ }; uint8_t const adata[] = { /* */ }; uint8_t const pt[] = { /* */ }; uint8_t dec_pt[sizeof(pt)]; uint32_t n_mac_bytes = 16; uint8_t ct[sizeof(pt) + n_mac_bytes]; uint32_t working_buf[92]; /* create round keys */ if ((retcode = nacl_aes128_enc_key_schedule(key, enc_rk))!= NACL_SUCCESS) { /* handle error */ } if ((retcode = nacl_aes128_dec_key_schedule(enc_rk, dec_rk))!= NACL_SUCCESS) { /* handle error */ } /* encrypt the plaintext */ if ((retcode = nacl_aes128_ccm_encrypt(working_buf, nonce, sizeof(nonce), adata, sizeof(adata), pt, sizeof(pt), n_mac_bytes, enc_rk, ct))!= NACL_SUCCESS) { /* handle error */ } /* decrypt the ciphertext */ if ((retcode = nacl_aes128_ccm_decrypt(working_buf, nonce, sizeof(nonce), adata, sizeof(adata), ct, sizeof(ct), n_mac_bytes, enc_rk, pt))!= NACL_SUCCESS) { /* handle error */ } /* make sure the decrypted plaintext is equal to the original */ check_plaintext(dec_pt, sizeof(ct) n_mac_bytes, pt, sizeof(pt)); Notes All functions return an error code (success == NACL_SUCCESS = 0) Random Byte Generator need not be seeded Generate encryption and decryption round keys from the AES key: Storing round keys improves performance for subsequent use of an AES key, or for faster switching between AES keys Encrypt takes: working_buf: scratch memory used by the libraries nonce: used to randomize starting point of counter-mode encryption. Must be unique to this call. adata: data that will be authenticated but not encrypted pt: plaintext n_mac_bytes: length of authentication code enc_rk: encryption round keys derived from the AES key ct: buffer where ciphertext will be output: must be pre-allocated and large enough for ciphertext (plaintext size + MAC) Decrypt takes: working_buf: scratch memory used by the libraries nonce: must be the same as the one used by the encryptor adata: must be the same as that used by the encryptor ct: ciphertext for decryption n_mac_bytes: length of authentication code dec_rk: decryption round keys derived from the encryption round keys dec_pt: buffer where plaintext will be output: must be pre-allocated and large enough for plaintext (ciphertext size MAC)

Conclusion Security Innovation NXP Libraries: Are hand crafted in assembler specifically for the chip and provide the highest possible performance in software Are flexible and allow you to update software in the field to keep ahead of hackers and protect your IP Have an extremely small footprint for effectiveness and efficiency Provide high quality documentation for rapid implementation Are professionally developed and maintained for maximum reliability Provides all of the key cryptographic support for high strength systems Asymmetric/Public Key Symmetric/Block Digital Signatures Message Digests

Questions? Cost: One-time development kit cost is $1,500/seat Low per unit license fee Support free 30-day evaluation detailed user s guide Contact Pete Jenney, +1.978.694.1008 x30, pjenney@securityinnovation.com For NXP ARM questions, gene.carter@nxp.com Support for Cortex pending Partnership with PolarSSL pending