Skip to content

Embedded Security Consulting

Secure embedded Systems through sound Advice

The KiviCore founders and employees combine decades of experience in the development of ASIC and FPGA systems, as well as in the implementation of security solutions. With deep knowledge in classical and post-quantum cryptography and a strong focus on future-oriented technologies, we are your reliable partner for secure and high-performance embedded systems.

Strategic Security Consulting

  • Definition of security goals and requirements for embedded systems
  • Development of threat models and implementation of security analyses
  • Advice on compliance with legal requirements and security standards (e.g. Cyber Resilience Act, NIST)

Security Architecture and Concept Development

  • Design of secure architectures for ASIC- and FPGA-based systems and embedded software
  • Analysis and evaluation of different implementation approaches
  • Consulting on post-quantum cryptography (PQC) and classic cryptographic algorithms 

Prototyping and Evaluation

  • Support in the development of proof-of-concepts (PoCs) for security solutions
  • Support in the design and evaluation of hardware and software demonstrators
  • Support in the development of products
  • SoC design

Security Protocols and Compliance

  • Advice on implementing secure communication protocols (e.g. MACsec, IPsec)
  • Support with the integration of cryptographic standards
  • Evaluation and optimization of existing security mechanisms
CRA-1

Cyber Resilience Act

 

Due to the Cyber Reslience Act manufacturers of microelectronics must take action. Manufacturers must assess which attacks and exploits, regardless of an attacker’s motives, could affect the device. 

We offer services to help you with that. 

MACsec-light

MACSec and Key Agreement

MACsec stands for Media Access Control Security and is a standard to secure point-to-point network communication on the data data link layer (Layer 2) of the OSI 7 layer model.

We offer the development & implementation  of MACsec concepts based on MKA and pre-shared keys.

IPSec

IPsec is a Layer 3 encryption technology to secure IP traffic. To utilize this IPsec, an Internet Key Exchange protocol IKEv2 is needed. IKEv2 creates secure associations, negotiates encryption, and generates session keys.

We can help you by creating IPsec  and IKE concepts and implementing them onto different target platforms. 

ARM SoC Security

ARM processors and SoC architectures are well known and widely used in embedded systems. Implementing security measures to make components and systems more secure is a must have for new products.

We offer services to secure your RISC-V based SoC.

RISC-V SoC Security

RISC-V is an open standard processor architecture, which is used in several applications. Making RISC-V system on chip SoC architectures secure is a must have for new product designs.

We offer services to secure your RISC-V based SoC.

Bluetooth

Bluetooth Low Energy Security

Bluetooth Low Energy is widely used in many embedded systems to wirelessly connect to other devices. Security measures such as secure pairing, secure authentication, or data encryption will become more important.

We support many different BLE hardware and software stacks such as Espressif, Nordic or Zephyr.