The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage
Root of Trust
Overview
Technical Specifications
Foundry, Node
130nm, 110nm, 100nm, 65nm
Maturity
Silicon Proven
Availability
Now
Related IPs
- Root of Trust eSecure module for SoC security
- RT-630 Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-660 DPA & Fault Injection Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140
- PUF-based Hardware Root of Trust
- RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine