Vendor: CAST Category: Root Of Trust

SoC Security Platform / Hardware Root of Trust

GEON-SoC is an area-efficient, processor-agnostic, hardware root of trust for SoC designs.

Overview

GEON-SoC is an area-efficient, processor-agnostic, hardware root of trust for SoC designs. It implements secure boot and can optionally be enhanced to support firmware decryption and secure debug, or to act as a post-boot hardware security module (HSM).

As a hardware root of trust, the GEON-SoC platform guarantees the authenticity and integrity of the loaded firmware. To this end, GEON uses state-of-the-art cryptographic digital signatures, an approach that requires no “secret” to be stored on-chip (only the vendors’ public key). GEON optionally supports authenticated decryption in case the firmware itself needs to be protected using encryption.

Furthermore, the optional GEON Secure Debug function restricts functional access via the debug interface to trusted users only, and may also provide device authentication. Authentication of trusted users employs a challenge/response scheme based on public-key cryptography. As in the case of firmware authentication, user authentication requires no private key to be stored on chip.  

After booting, the SoC Security Platform can be transformed to an HSM, allowing the system to use its cryptographic primitives and functions (random number generation, generation of keys, implementation of encryption algorithms).  

Designed for reuse, the GEON SoC Security Platform is processor-agnostic and works with all modern architectures including ARM, MIPS, RISC-V, and the entire BA2x processor family from Beyond Semiconductor. It is also configurable so that only those functions needed to address the threat assessment of the design team need be selected. This allows a team to minimize area requirements while optimizing the performance of the security subsystem being deployed. Under its default configuration, GEON implements EdDSA/Ed25519 digital signatures, and SHA-3/Keyak v2 authenticated decryption, but can be further equipped with other asymmetric and symmetric cryptographic algorithms like RSA, AES-GSM, etc.

Key features

  • Reusable, Reliable, Compact HW Root of Trust Platform 
    • Processor-Agnostic: Works with ARM, MIPS, RISC-V, Beyond BA2x or any other microprocessor 
    • Process-Independent: RTL design with flexible interface to technology-specific modules (e.g. OTP)  
    • Customizable and tunable boot sequence, security algorithms, features, and interfaces  
    • Security functions share common hardware modules  
    • Production-proven
  • Secure Boot
    • Ensures integrity and authenticity of firmware
    • Independent of & isolated from the application processor(s)
    • Uses ED25519 (default) and requires no secret to be stored on-chip
    • Minimal boot-time impact (typically 0-5ms)
  • Firmware Encryption
    • Protects confidentiality of externally or internally stored firmware
    • On-the-fly Keyak (default) decryption for zero boot-time overhead.
  • Secure Debug
    • Secure JTAG Debug, with end-to-end cryptographic guarantees
    • Uses digital signatures to authenticate users. Optional device authentication
    • Requires no secret to be stored on-chip
  • HSM
    • Secure generation and storage of secret key material
    • Secure operations using secret key material, such as sign, encrypt, decrypt etc.
    • Supports ED25519, RSA, AES-GCM, SHA-2, SHA-3 and others

Block Diagram

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
GEON-SoC
Vendor
CAST
Type
Silicon IP

Provider

CAST
HQ: USA
CAST is a silicon intellectual property (IP) developer, aggregator, and integrator providing IP cores and subsystems since 1993. Our product line features both leading-edge and standards-based digital IP, including compression engines and image processing functions; 8051 microcontrollers and low-power 32-bit BA2X™ processors; industry-leading automotive interfaces; a complete family of SoC security modules; and a variety of peripherals, interfaces, and other IP cores. Our goal is to maximize IP benefits for our customers by delivering high quality, easy to use, cost effective solutions for real system development challenges. We minimize customer risk through rigorous development standards, complete deliverables with comprehensive documentation, and superlative customer support. We maximize customer value thorough competitive pricing and simple licensing—including royalty-free options—and long-term partnerships with all leading silicon providers and select technology leaders. Our product standards and business practices have been uniquely honed through successful projects with hundreds of systems designers since the very beginnings of the IP industry, making CAST one of the best IP partners available.

Learn more about Root Of Trust IP core

Root of Trust: A Security Essential for Cyber Defense

Imagine a datacenter powering critical cloud services, silently compromised by a tampered chip inserted during manufacturing. In most cases, the malware would be practically impossible to remove and could persist across formats/reinstalls !

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Root of Trust IP cores

What is SoC Security Platform / Hardware Root of Trust?

SoC Security Platform / Hardware Root of Trust is a Root Of Trust IP core from CAST listed on Semi IP Hub.

How should engineers evaluate this Root Of Trust?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Root Of Trust IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP