Cloud native EDA tools & pre-optimized hardware platforms
Device connectivity has an increasing impact on the medical industry. Besides convenience for caretakers, this also leads to risks of cyber-attacks, evident when the FDA recalled 500 thousand of internet-connected pacemakers for hacking fears. While more equipment is connected to various networks, consumables like catheters and body sensors are also (wirelessly) connected to medical equipment. Clearly, medical equipment needs to be safe from cyber-attacks, guarantee patient privacy, and keep costs, liability, and risks for the device maker low. At the same time, the growing connectivity also allows new business models for equipment makers, like pay-per-use or monitoring consumables. But none of this is possible without the trust that is critical in this market. So, what are the security risks medical equipment makers need to overcome?
Requirements for medical equipment are changing. Manufacturers need to balance the safety of patients with the increasing demands for connectivity to increase convenience for care providers and add business opportunities for themselves. But to guarantee the safe operation of a device, the connections with the network need to be secured, consumables need to be authenticated, and IP inside the device needs to be protected. How can equipment makers deal with all these new requirements?
Foundational for medical equipment security are cryptographic keys that allow authentication to the network, encrypting data, authenticating consumables, and protecting valuable IP. This is needed to keep connected medical equipment safe, such as pacemakers, insulin pumps, and sensing equipment. Keys are derived from the secret identity of the device, which should be rooted in hardware. It must be impossible to read or alter this identity or to clone it to create counterfeit devices. So, how do an identity and keys get on a device, and how are they stored securely? Through Synopsys’ SRAM PUF technology. SRAM PUFs create unclonable, device-unique keys from tiny variations in silicon of the device’s main chip. These keys are never stored and cannot be copied. They are immutable and invisible to attackers, providing unparalleled security. SRAM PUF keys are the foundation for many security solutions:
Synopsys provides its SRAM PUFs with the described security solutions integrated into the hardware of chips from several vendors, but also in software and as FPGA implementation for inclusion in device firmware. The solution has a very small footprint and a low cost.
Algorithms for symmetric and public key cryptography are included and compliant with NIST specifications. SRAM PUFs can be implemented on any typical microcontroller. For FPGAs without accessible SRAM, Synopsys provides a solution that creates a PUF in the programmable fabric of the FPGA. Synopsys SRAM PUFs offer the best-in-class combination of high security, low cost, and high flexibility: