Secure IP
Filter
Compare
861
IP
from 90 vendors
(1
-
10)
-
TLS - Validates TLS protocols to ensure secure, encrypted data transmission
- TLS Verification IP (VIP) ensures secure communication by validating TLS protocol implementations. It simulates handshake processes, tests encryption, and verifies data integrity to protect against cyber threats during data transmission.
- This product finds application in web browsing, email security, VPNs, cloud services, mobile apps, and more. It safeguards sensitive data across various platforms, ensuring end-to-end encryption and robust protection in diverse network environments
-
AES - Encrypts sensitive data to ensure secure communication and transactions
- AES (Advanced Encryption Standard) is a widely-used encryption algorithm designed to secure sensitive data. It offers high levels of security with key sizes of 128, 192, or 256 bits and supports multiple encryption modes, ensuring robust protection for communications and transactions.
- AES is implemented in Verification IP (VIP) to verify cryptographic hardware modules in systems such as processors and communication devices. Its versatility makes it crucial for applications ranging from government communications to cloud storage and financial transactions
-
Secure OTP
- Up to 128kb mass production OTP with built-in instant hardware encryption (customization available)
- Comprehensive anti-tamper designs in physical and RTL
- APB control interface with secure/non-secure access privilege
- Four 256-bit hardware PUF fingerprints for scrambling drop-in-use Secure OTP Storage
-
tRoot V500 Hardware Secure Module
- Complete hardware secure modules with Root of Trust give SoCs a unique, tamper-proof identity
- Enable secure services deployment
- Provide a Trusted Execution Environment to create, provision, store and manage keys
- Full hardware key protection
-
tRoot F120 Hardware Secure Module (w/ARC SEM120)
- Choice of energy-efficient ARC SEM110, SEM120D, EM4 + ESP, or EM5D + ESP processors
- Extensive collection of hardware accelerated cryptography options
- Secure instruction and data memory controllers
- Host and peripheral interfaces (UART, NVM, GPIO, TRNG, Device ID)
-
tRoot F110 Hardware Secure Module (w/ARC SEM110)
- Choice of energy-efficient ARC SEM110, SEM120D, EM4 + ESP, or EM5D + ESP processors
- Extensive collection of hardware accelerated cryptography options
- Secure instruction and data memory controllers
- Host and peripheral interfaces (UART, NVM, GPIO, TRNG, Device ID)
-
tRoot F005 Hardware Secure Module (w/ ARC EMD5D)
- Choice of energy-efficient ARC SEM110, SEM120D, EM4 + ESP, or EM5D + ESP processors
- Extensive collection of hardware accelerated cryptography options
- Secure instruction and data memory controllers
- Host and peripheral interfaces (UART, NVM, GPIO, TRNG, Device ID)
-
tRoot F004 Hardware Secure Module (w/ ARC EM4)
- Choice of energy-efficient ARC SEM110, SEM120D, EM4 + ESP, or EM5D + ESP processors
- Extensive collection of hardware accelerated cryptography options
- Secure instruction and data memory controllers
- Host and peripheral interfaces (UART, NVM, GPIO, TRNG, Device ID)
-
tRoot F022 Hardware Secure Module (w/ ARC EM22FS)
- ASIL B Certified tRoot Hardware Secure Module provides the Root of Trust for a system, protects against malicious attacks, and prevents random and systematic faults
- Meets stringent ISO 26262 safety process and documentation requirements (ASIL D systematic grade)
- Fully programmable solution safeguards against evolving threats with high-grade security
-
tRoot Hardware Secure Modules for iSIM
- Migrating from discrete SIM cards to an embedded iSIM solution reduces area, power, and cost
- Out-of-the-box connectivity using integrated bootstrap code within the HSM
- Leverages Truphone’s global network by bundling default connectivity profile on each chipset
- Factory-loaded bootstrap profile enables global connectivity, but not locked to Truphone