We support you with comprehensive consulting and hardware software co-design services for secure FPGA based embedded systems.

How we can help you
Services for secure FPGA Devices
1
Analysis & Check
- Definition of security goals and requirements
- Analysis of existing FPGA & software security concepts and features
- Compliance check & gap analysis of FPGAs & embedded software in relation to cybersecurity standards (e.g. CRA)
- Consulting on PQC and classic cryptographic algorithms
2
Architecture & Concepts
- Creation of customized secure FPGA designs & firmware
- Integration of IP cores for secure data transmission, protocol implementations, or key handling e.g. MACsec, IPsec, PQC
- Customization & optimization of security solutions for various FPGA platforms (e.g. Microchip, Lattice, Altera, Xilinx, Efinix)
3
Design & Implementation
- Integration of crypto primitive IP cores
- Integration of security mechanisms
- Secure boot
- Secure life cycle
- Secure key exchange
- Secure communication
- Secure updates
- Secure storage
4
Prototyping & Testing
- Development of PoCs for security solutions
- FPGA-Design and firmware design
- Carrying out threat analyses and simulation-based security tests
- Verifying security-critical designs to ensure protection against side-channel attacks and other vulnerabilities
Explore our offerings
Our FPGA Security Consulting & Design Offerings

Cyber Resilience Act
Due to the Cyber Reslience Act manufacturers of microelectronics must take action. Manufacturers must assess which attacks and exploits, regardless of an attacker’s motives, could affect the device.
We offer services to help you with that.

MACSec and Key Agreement
MACsec stands for Media Access Control Security and is a standard to secure point-to-point network communication on the data data link layer (Layer 2) of the OSI 7 layer model.
We offer the development & implementation of MACsec concepts based on MKA and pre-shared keys.

IPSec & Key Agreement
IPsec is a Layer 3 encryption technology to secure IP traffic. To utilize this IPsec, an Internet Key Exchange protocol IKEv2 is needed. IKEv2 creates secure associations, negotiates encryption, and generates session keys.
We can help you by creating IPsec and IKE concepts and implementing them onto different target platforms.

ARM SoC Security
ARM processors and SoC architectures are well known and widely used in embedded systems. Implementing security measures to make components and systems more secure is a must have for new products.
We offer services to secure your RISC-V based SoC.

RISC-V SoC Security
RISC-V is an open standard processor architecture, which is used in several applications. Making RISC-V system on chip SoC architectures secure is a must have for new product designs.
We offer services to secure your RISC-V based SoC.