Root of Trust IP
Filter
Compare
55
IP
from 14 vendors
(1
-
10)
-
Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
- The RT-64x Embedded Hardware Security Module (Root of Trust) family are fully programmable, ISO 26262 ASIL-B hardware security cores offering security by design for automotive applications.
- They protect against a wide range of failures such as permanent, transient and latent faults and hardware and software attacks with state-of-the-art anti-tamper and security techniques.
-
Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
- The CryptoManager RT-6xx v3 Root of Trust family from Rambus is the latest generation of fully programmable FIPS 140-3 compliant hardware security cores offering Quantum Safe security by design for data center and other highly secure applications.
- Device and system architects face a growing array of security threats, including the threat of quantum computers. Across applications, one constant is the need for a hardware Root of Trust-based security implementation.
-
SoC Security Platform / Hardware Root of Trust
- GEON-SoC is an area-efficient, processor-agnostic, hardware root of trust for SoC designs.
- It implements secure boot and can optionally be enhanced to support firmware decryption and secure debug, or to act as a post-boot hardware security module (HSM).
-
Programmable Root of Trust With DPA and FIA for US Defense
- Custom-designed 32-bit secure RISC-V processor
- Multi-layered security model protects all core components against a wide range of attacks
- Security model includes hierarchical privilege model, secure key management policy, hardware-enforced isolation/access control/protection, error management policy
- State-of-the-art DPA resistance, FIA protection and anti-tamper techniques
-
Root of Trust (RoT)
- Large Silicon Footprint: Open-source RoTs typically require significant silicon area, making them impractical for size-constrained devices.
- High Energy Consumption: Existing solutions often consume excessive power, limiting their adoption in low-power environments like IoT devices.
- Lack of Future-Proofing: Emerging security demands, such as Post-Quantum Cryptography (PQC), are frequently overlooked by current designs.
-
tRoot Fx Hardware Secure Modules: Programmable Root of Trust
- Efficient ARC SEM Security Processor
- SoC host and peripheral interfaces
- APEX cryptography acceleration (CryptoPack)
- Clock and reset management
-
Via-PUF Security Chip for Root of Trust
- Device authentication by sym. and asym. cryptography.
- Firmware protection
- Data encryption
- Anti-counterfeiting
-
Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
- Hardware Root of Trust employing a custom 32-bit RISC-V processor
- Multi-layered security model provides protection of all components in the core
- NIST CAVP and CMVP compliant for FIPS 140-3 validation
- State-of-the-art anti tamper techniques
- DPA-resistant cryptographic accelerators
- Caliptra Root of Trust for Measurement with DICE and X.509 support
-
Root of Trust - Foundational security for SoCs, secure MCU devices and sensors
- Secure Boot assist to host CPU(s) and protection of key material
- Secure firmware upgrade management for Host CPU
- Lifecycle management support
- Secure Debug support