Root of Trust IP

Filter
Filter

Login required.

Sign in

Login required.

Sign in

Login required.

Sign in

Compare 55 IP from 14 vendors (1 - 10)
  • Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
    • The RT-64x Embedded Hardware Security Module (Root of Trust) family are fully programmable, ISO 26262 ASIL-B hardware security cores offering security by design for automotive applications.
    • They protect against a wide range of failures such as permanent, transient and latent faults and hardware and software attacks with state-of-the-art anti-tamper and security techniques.
    Block Diagram -- Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
  • Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
    • The CryptoManager RT-6xx v3 Root of Trust family from Rambus is the latest generation of fully programmable FIPS 140-3 compliant hardware security cores offering Quantum Safe security by design for data center and other highly secure applications.
    • Device and system architects face a growing array of security threats, including the threat of quantum computers. Across applications, one constant is the need for a hardware Root of Trust-based security implementation.
    Block Diagram -- Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
  • SoC Security Platform / Hardware Root of Trust
    • GEON-SoC is an area-efficient, processor-agnostic, hardware root of trust for SoC designs.
    • It implements secure boot and can optionally be enhanced to support firmware decryption and secure debug, or to act as a post-boot hardware security module (HSM).
    Block Diagram -- SoC Security Platform / Hardware Root of Trust
  • Programmable Root of Trust With DPA and FIA for US Defense
    • Custom-designed 32-bit secure RISC-V processor
    • Multi-layered security model protects all core components against a wide range of attacks
    • Security model includes hierarchical privilege model, secure key management policy, hardware-enforced isolation/access control/protection, error management policy
    • State-of-the-art DPA resistance, FIA protection and anti-tamper techniques
    Block Diagram -- Programmable Root of Trust With DPA and FIA for US Defense
  • Root of Trust (RoT)
    • Large Silicon Footprint: Open-source RoTs typically require significant silicon area, making them impractical for size-constrained devices.
    • High Energy Consumption: Existing solutions often consume excessive power, limiting their adoption in low-power environments like IoT devices.
    • Lack of Future-Proofing: Emerging security demands, such as Post-Quantum Cryptography (PQC), are frequently overlooked by current designs.
  • tRoot Fx Hardware Secure Modules: Programmable Root of Trust
    • Efficient ARC SEM Security Processor
    • SoC host and peripheral interfaces
    • APEX cryptography acceleration (CryptoPack)
    • Clock and reset management
  • Via-PUF Security Chip for Root of Trust
    • Device authentication by sym. and asym. cryptography.
    • Firmware protection
    • Data encryption
    • Anti-counterfeiting
    Block Diagram -- Via-PUF Security Chip for Root of Trust
  • Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
    • Hardware Root of Trust employing a custom 32-bit RISC-V processor
    • Multi-layered security model provides protection of all components in the core
    • NIST CAVP and CMVP compliant for FIPS 140-3 validation
    • State-of-the-art anti tamper techniques
    • DPA-resistant cryptographic accelerators
    • Caliptra Root of Trust for Measurement with DICE and X.509 support
    Block Diagram -- Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
  • Root of Trust - Foundational security for SoCs, secure MCU devices and sensors
    • Secure Boot assist to host CPU(s) and protection of key material
    • Secure firmware upgrade management for Host CPU
    • Lifecycle management support
    • Secure Debug support
    Block Diagram -- Root of Trust - Foundational security for SoCs, secure MCU devices and sensors
×
Semiconductor IP