Secure Boot Hardware Engine IP
Filter
Compare
11
IP
from 5 vendors
(1
-
10)
-
Secure Boot Hardware Engine
- Protection Layers
- Public-Key Authentication Benefits
- Fast & Compact
-
SHA-3 Crypto IP Core
- Area efficient
- High throughput
- Compliant to NIST’s FIPS 202 standard
-
Root of Trust eSecure module for SoC security
- Secure Boot
- Firmware update in the field
- Secure key storage
-
Security Enclave IP based on RISC-V
- Secure Boot
- Firmware update in the field
- Secure key storage
-
PUF-based Secure Crypto Coprocessor
- Provide a much easier to adopt hardware RoT with less vulnerability
-
PUF-based Hardware Root of Trust
- PUF-based Unique ID
- PUF-based True Random Number Generator
- PUF-based Secure Key Storage
-
tRoot Vx Hardware Secure Modules
- The Synopsys tRoot Vx HSMs include a highly secure hardware Root of Trust that enables devices to boot securely and permits encryption and decryption of sensitive data allowing it to be stored in non-secure devices or memory. It provides a completely secure environment in a non-secure system from which applications can execute secure cryptographic services.
- The tRoot Vx HSMs secure SoCs by using unique code protection mechanisms that provide run-time tamper detection and response. Code privacy protection is achieved without the added cost of dedicated secure memory. This unique feature reduces system complexity and cost by allowing the tRoot Vx HSM’s firmware to reside in any non-secure memory space.
- Commonly, tRoot Vx programs reside in shared system DDR memory. Due to the confidentiality and integrity provisions of the secure instruction controller, this memory is effectively private to the HSM and impervious to attempts to modify it originating in other subsystems in the chip, or from outside. The tRoot Vx HSM’s ROM-less architecture can support system design changes at any time without risk of exposing the system memory to threats and without additional engineering development cost. To minimize the number of attack vectors, tRoot Vx HSMs use a simple interface with a limited set of interactions with the host processor.