Vendor: Synopsys, Inc. Category: Root Of Trust

tRoot Fx Hardware Secure Modules: Programmable Root of Trust

The tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authe…

Overview

The tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment.
The flexible tRoot Fx HSM (Figure 1) includes fully programmable and highly configurable solutions that enable designers to tune the HSM to their exact requirements, while the pre-built tRoot Vx HSM family offers a defined security boundary for a complete, drop-in security solution.
tRoot HSMs are designed to easily integrate into system-on-chips (SoCs) and provide robust hardware-enforced protection while maintaining a high level of performance through cryptographic acceleration and offering designers options to create solutions with the most efficient combination of power,
size, and performance. tRoot HSMs provide a Trusted Execution Environment (TEE) to protect sensitive information and processing and implement security- critical functions such as secure boot, storage, debug, anti-tampering and key management required throughout the device life cycle.

Key features

  • Efficient ARC SEM Security Processor
  • SoC host and peripheral interfaces
  • APEX cryptography acceleration (CryptoPack)
  • Clock and reset management
  • Rich software libraries (NIST validated cryptography, device drivers, secure boot, and DSP)
  • SecureShield runtime library
  • Synopsys TRNG reference design example
  • Synopsys ARChitect IP configuration tool
  • Secure APEX extension options

Benefits

  • Fully programmable and highly configurable tRoot FX hardware secure modules protect against malicious attacks targeting high value applications
  • Integrated ARC SEM Security Processor protects against side-channel attacks
  • Software and hardware cryptography options accelerate a range of crypto algorithms including AES, 3DES, SHA-256 and RSA/ECC
  • Secure instruction and data controllers provide external memory encryption and authentication
  • tRoot Fx HSM software includes NIST- validated platform libraries, cryptography library, secure boot toolkit, and SecureShield runtime library

Applications

  • Mobile
  • Embedded SIM (eSIM/iSIM)
  • Embedded universal integrated circuit card (eUICC/iUICC)
  • Embedded secure element
  • Mobile payment
  • Internet of Things (IoT)
  • Smart metering
  • eGovernment IDs
  • Automotive
  • Telematics
  • V2V/V2I communications
  • Industrial
  • Programmable logic controllers (PLC)
  • Robotics

What’s Included?

  • IPLib installation file, which includes:
  • User-configurable hardware (RTL) and software source code (using Synopsys’ ARChitect IP configuration tool)
  • Complete set of front-end views
  • Demonstration application available as design template
  • ARC EM IPLib installation file
  • Databook (PDF)
  • Release notes (PDF)
  • ARChitect configuration tool

Specifications

Identity

Part Number
dwc_troot_fx_hardware_secure_modules
Vendor
Synopsys, Inc.
Type
Silicon IP

Files

Note: some files may require an NDA depending on provider policy.

Provider

Synopsys, Inc.
HQ: USA
Synopsys is a leading provider of high-quality, silicon-proven semiconductor IP solutions for SoC designs. The broad Synopsys IP portfolio includes logic libraries, embedded memories, analog IP, wired and wireless interface IP, security IP, embedded processors and subsystems. To accelerate IP integration, software development, and silicon bring-up, Synopsys’ IP Accelerated initiative provides architecture design expertise, pre-verified and customizable IP subsystems, hardening, and signal/power integrity analysis. Synopsys' extensive investment in IP quality, comprehensive technical support and robust IP development methodology enables designers to reduce integration risk and accelerate time-to-market.

Learn more about Root Of Trust IP core

Root of Trust: A Security Essential for Cyber Defense

Imagine a datacenter powering critical cloud services, silently compromised by a tampered chip inserted during manufacturing. In most cases, the malware would be practically impossible to remove and could persist across formats/reinstalls !

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Root of Trust IP cores

What is tRoot Fx Hardware Secure Modules: Programmable Root of Trust?

tRoot Fx Hardware Secure Modules: Programmable Root of Trust is a Root Of Trust IP core from Synopsys, Inc. listed on Semi IP Hub.

How should engineers evaluate this Root Of Trust?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Root Of Trust IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP