Cloud native EDA tools & pre-optimized hardware platforms
Dana Neustadter, Sr. Marketing Manager for Security IP Solutions, Synopsys
As more devices enter the market and drive exponential growth of data in the cloud, cloud computing is going through a significant overhaul. The increasing presence of “hyperscale” cloud providers for big data and analytics, 5G for rapid IoT connectivity, and the wide use of AI for natural data processing and for extracting insights, are compounding both the amount of connected data and the data vulnerability.
To keep up with the rapid data growth, designers are driving innovation in interface and storage technologies to support increased capacity and performance, as well as more acceleration and new compute architectures. High-speed interfaces like PCI Express® (PCIe®) 5.0/6.0 and Compute Express Link™ (CXL™) 2.0 are proliferating:
How can system architects protect cloud data that contain confidential, sensitive, or critical information that can be corrupted, replaced, modified, or stolen by malicious actors? I/O interconnects need to implement security from the start of the design. With limited security, attackers might aim to profit from the secrets learned, interfere with the operations of a targeted company, or obstruct a government agency. The types of hacks differ in nature and continue to evolve, like attacks from malicious peripherals delivered over PCIe links, or root access attacks to access memory of other processes to capture secrets and/or alter code execution.
In addition, the industry is faced with increasing laws and regulations such as:
As the attacks become more sophisticated, the security standards have to continuously adapt to better protect sensitive data and communications and ultimately protect our connected world. To this end, the PCI-SIG and CXL standards organizations added security requirements like Integrity and Data Encryption to PCIe 5.0 and CXL 2.0 specifications in late 2020, and PCIe 6.0 in early 2022. Security is expected to continue to be adopted for the next generation PCIe 7.0 and CXL 3.0 interconnects as well.
Security for PCI and CXL interfaces has two main components: 1) Authentication & Key Management, and 2) Integrity and Data Encryption (IDE), as depicted in Figure 1.
Figure 1: PCIe & CXL security system level view
Authentication and key management include functions like authentication, attestation, measurement, identification, and key exchange, all running in a trusted execution environment / secure module.
The main reference standard for authentication and key management is the Security Protocol and Data Module (SPDM) that is managed by the Distributed Management Task Force (DMTF). SPDM defines messages, data objects and sequences for performing message exchanges between devices over various transport and physical media and enables efficient access to security capabilities and operations. The message exchanges’ description includes authentication of hardware and measurement of firmware identities.
The PCI-SIG introduced two Engineering Change Notices (ECNs) for authentication and key management:
There is more PCIe and CXL security layering being defined by the standards bodies, like TEE Device Interface Secure Protocol (TDISP) and CXL TEE Security Protocol (CXL-TSP) that define the security architecture and associated protocols for trusted I/Os and virtualization (like for example establishing trust between TEE virtual machines and devices).
IDE provides confidentiality, integrity and replays protection for Transaction Layer Packets (TLPs) for PCIe and Flow Control UnITs (FLITs) for CXL, ensuring that data on the wire is secure from observation, tampering, deletion, insertion and replay of packets. IDE is based on the AES-GCM cryptographic algorithm and receives keys from the Authentication & Key Management security component.
When looking for PCIe and CXL solutions with security, it is important to consider optimized solutions from trusted IP providers that offer highest performance, lowest latency and optimal area, compliance with the latest standards and backed by experts.
Synopsys recently announced the industry’s first security modules for protecting data in high-performance computing systems-on-chip (SoCs) that use the PCIe 5.0, PCIe 6.0 or CXL 2.0 protocols. The Synopsys IDE Security Modules IP for PCIe 5.0/6.0 or CXL 2.0 are already being deployed with hyperscaler cloud providers. The robust IDE Security Modules make it faster and easier for designers to protect against data tampering and physical attacks on links while complying with the latest versions of the interconnect protocols. The IDE Security Modules are designed and validated with Synopsys Controller IP for PCIe/CXL to accelerate SoC time-to-market while providing the configurability needed to adjust to the design’s specific use case.
With standards-compliant, plug-and-play Synopsys IDE Security Modules, designers can take advantage of:
Figure 2 depicts the Synopsys IDE Security Module for PCIe 5.0 block diagram, as well as the seamless pre-verification with the Synopsys PCIe 5.0 Controller IP to provide a full solution, low risk, and fast time-to-market for SoC designers.
Figure 2: Synopsys PCIe IDE Security Module block diagram & integration with Synopsys PCIe Controller
Similarly, Figure 3 depicts the Synopsys IDE Security Module for CXL 2.0 block diagram, as well as its pre-verification with the Synopsys CXL Controller.
Figure 3: Synopsys CXL IDE Security Module block diagram & integration with Synopsys CXL Controller
With the tremendous data growth in our connected world, security is essential to protect private and sensitive information in data as it transfers across systems, including over high performance interconnects such as PCIe and CXL. Synopsys is uniquely positioned in the market with complete standards-compliant secure interface solutions that align with the latest technology demands and enable SoC designers to quickly implement the required security with low risk and fast time to market.
In addition to PCIe and CXL IDE Security Modules, Synopsys provides a broad portfolio of highly integrated security IP solutions that use a common set of standards-based building blocks and security concepts to enable the most efficient silicon design and highest levels of security for a range of products in the mobile, automotive, digital home, IoT and cloud computing markets.
Synopsys’ highly configurable security IP solutions include hardware secure modules with Root of Trust, content protection, cryptography, and security protocol accelerators for integration into SoCs. These integrated solutions enable the heart of many security standards, supporting confidentiality, data integrity, user/system authentication, non-repudiation, and positive authorization. Combined, Synopsys’ security IP solutions help prevent a wide range of evolving threats in connected devices such as theft, tampering, side channels attacks, malware and data breaches.