Skip to Main Content

Ansys RedHawk-SC Security

Pre-Silicon Side-Channel Analysis

RedHawk-SC Security is the most comprehensive electronic design automation (EDA) solution for identifying hardware side-channel vulnerabilities in pre-silicon IC designs at any stage, from RTL to layout. It identifies physical side-channel leakage through power noise, power consumption, electromagnetic emissions, and thermal profiling.

Identify Pre-silicon Hardware Security Vulnerabilities from RTL to Layout

RedHawk-SC Security is the pre-silicon hardware security and data integrity analysis software, identifying and analyzing data integrity issues during semiconductor design. Chip designers can ensure the robust security of their products by identifying and resolving vulnerabilities before proceeding to manufacturing, where fixes are no longer possible, and calculating ‘measurement-to-disclosure’ metrics for many standard cryptographic key systems.

  • Identify physical vulnerabilities before manufacturing
    Identify physical vulnerabilities before manufacturing
  • Supports standard cryptographic systems
    Supports standard cryptographic systems
  • Analyze root cause of leakage
    Analyze root cause of leakage
  • Assess strength of design countermeasures
    Assess strength of design countermeasures
  • Check icon outline
    Security Insight GUI
  • Flow for analyzing very long activity vectors
    Flow for analyzing very long activity vectors
Semiconductor Security

Quick Specs

RedHawk-SC Security leverages Ansys gold-standard physics simulation engines to assess data security issues at the RTL and physical layout stages of semiconductor design before manufacturing. It analyzes on-chip power noise and near-field electromagnetic emissions from traces. Built-in security analytics include T-score and key disclosure reports for classical AES (Advanced Encryption Standard) and custom leakage models. Graphical feedback and rich analytical metrics score design countermeasures against data integrity vulnerabilities.

  • Built-in security analytics
  • Secret-key disclosure report
  • Electromagnetic trace generation
  • Electromagnetic field profiling
  • Fast processing of long activity vectors
  • Leakage point-of-interest identification
  • Big-data techniques increase simulation capacity

Pre-Silicon Side-channel Leakage Analysis

Assess and quantify data integrity vulnerabilities with Ansys RedHawk-SC Security

Semiconductor Security

Analyze and minimize a chip’s vulnerability to side-channel analysis and the risk of exposing confidential data

Modern cryptography ensures data integrity and information security for industries such as automotive, financial, 5G, and IoT. However, unintentional weaknesses in the underlying semiconductor hardware can compromise cryptography. Side-channel leakage analysis (SCLA) involves extracting sensitive data, such as secret cryptographic keys, from vulnerable hardware by probing a spectrum of physical phenomena. Since hardware vulnerabilities cannot be fixed once a chip is manufactured, it is vital to identify side-channel countermeasures in the pre-silicon design stage to create secure hardware. This white paper demonstrates how Ansys RedHawk-SC Security enables IP and system-on-chip (SoC) design teams, with limited hardware security background, to predict and quantify design vulnerabilities for side-channel leakage analysis and assess the effectiveness of design countermeasures for increased security.

Analyze Pre-silicon IC Designs to Identify and Mitigate Physical Side-channel Security Vulnerabilities

Ansys RedHawk-SC Security does multiphysics simulations of side-channel leakage at various abstraction levels. Not only is simulation much faster and cheaper than hardware testing, but it is also the only way to achieve robust, secure, and reliable silicon hardware. RedHawk-SC Security provides analytic metrics like T-score and SMTD that quantify how vulnerable a design is to power-noise and electromagnetic field side-channel analysis which enables a cost-effective strategy for implementing security countermeasures. 

Ansys Redhawk-SC performs IC electrothermal simulations

Key Features

Ansys RedHawk-SC Security is a pre-silicon hardware security software tool. It relies on multiphysics simulations and security analytics to assess side-channel leakage vulnerabilities early and the effectiveness of design countermeasures. Designers use this to modify the layout in the design stage before manufacturing to prevent data integrity leaks in the field and avoid costly silicon re-spins. 

  • Comprehensive coverage of power and electromagnetic side-channel leakage
  • Rich security metrics such as SMTD, T-score and sensitivity score
  • Exceptionally fast turnaround time
  • Capacity to simulate millions of cycles of functional vectors
  • Cloud-optimized elastic compute architecture
  • Ability to virtually probe side-channel leakage above the chip surface.

RedHawk-SC Security is built on the SeaScape™ cloud-optimized parallel compute infrastructure, making it easy to simulate large multiphysics models for side-channel leakage quickly.

RedHawk-SC Security generates probing configurations for critical side channel vulnerabilities based on security-aware switching scenarios from millions of cycles of design activity.

RedHawk-SC Security is built on the SeaScape big data analytics platform which is designed for cloud execution on 1,000s of CPU cores with near linear scalability and extremely high capacity with low memory per core. It also displays side-channel leakage results in an easily accessible, intuitive graphic user interface.

Patented technology simulates off-chip emissions created by on-chip power noise. It enables the assessment of near-field electromagnetic side-channel leakage.

AES (Advanced Encryption Standard) and custom cryptographic leakage models

Ansys software is accessible

It's vital to Ansys that all users, including those with disabilities, can access our products. As such, we endeavor to follow accessibility requirements based on the US Access Board (Section 508), Web Content Accessibility Guidelines (WCAG), and the current format of the Voluntary Product Accessibility Template (VPAT).

See What Ansys Can Do For You

Contact us today

* = Required Field

Thank you for reaching out!

We’re here to answer your questions and look forward to speaking with you. A member of our Ansys sales team will contact you shortly.

Footer Image