Secure Hardware Root of Trust IP

Filter
Filter

Login required.

Sign in

Login required.

Sign in

Login required.

Sign in

Compare 47 IP from 13 vendors (1 - 10)
  • tRoot Fx Hardware Secure Modules: Programmable Root of Trust
    • Efficient ARC SEM Security Processor
    • SoC host and peripheral interfaces
    • APEX cryptography acceleration (CryptoPack)
    • Clock and reset management
  • SoC Security Platform / Hardware Root of Trust
    • GEON-SoC is an area-efficient, processor-agnostic, hardware root of trust for SoC designs.
    • It implements secure boot and can optionally be enhanced to support firmware decryption and secure debug, or to act as a post-boot hardware security module (HSM).
    Block Diagram -- SoC Security Platform / Hardware Root of Trust
  • Silicon Proven Hardware Root of Trust
    • The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification.
    • Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
  • Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine
    • PUFef is designed to protect embedded Flash with a Hardware Root of Trust and a lite crypto engine of RC6.
    • The RC6 provides a comprehensive level of security while also minimizing overall size.
    • Before attempting to hack the crypto engine, attackers would first have to destroy the embedded Flash.
    Block Diagram -- Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine
  • Hardware Root of Trust IP
    • Built-in standard APB controller with privilege control to create secure/non-secure separation. Additionally, interface customization is available for different design requirements.
    • Four 256-bit hardware PUF chip fingerprints, include a self-health check that can be used as a unique identification(UID) or a root key(seed).
    • High-quality true random number generator (TRNG)
    • 8k-bit mass production OTP with built-in instant hardware encryption (customization available)
    Block Diagram -- Hardware Root of Trust IP
  • Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
    • The RT-64x Embedded Hardware Security Module (Root of Trust) family are fully programmable, ISO 26262 ASIL-B hardware security cores offering security by design for automotive applications.
    • They protect against a wide range of failures such as permanent, transient and latent faults and hardware and software attacks with state-of-the-art anti-tamper and security techniques.
    Block Diagram -- Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
  • Root of Trust - Foundational security for SoCs, secure MCU devices and sensors
    • Secure Boot assist to host CPU(s) and protection of key material
    • Secure firmware upgrade management for Host CPU
    • Lifecycle management support
    • Secure Debug support
    Block Diagram -- Root of Trust - Foundational security for SoCs, secure MCU devices and sensors
  • Root of Trust
    • Root of Trust IP is a Hardware Secure Module (HSM) solution that provides the security foundation for processors and System on Chips (SoCs).
    • It protects critical systems especially devices used in automotive, industrial, cloud, data center, and wireless applications.
    Block Diagram -- Root of Trust
  • Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
    • The CryptoManager RT-6xx v3 Root of Trust family from Rambus is the latest generation of fully programmable FIPS 140-3 compliant hardware security cores offering Quantum Safe security by design for data center and other highly secure applications.
    • Device and system architects face a growing array of security threats, including the threat of quantum computers. Across applications, one constant is the need for a hardware Root of Trust-based security implementation.
    Block Diagram -- Programmable Root of Trust with Quantum Safe Cryptography acceleration, DPA-resistant & FIA-protected cryptographic accelerators and Caliptra RoTM
  • Programmable Root of Trust With DPA and FIA for US Defense
    • Custom-designed 32-bit secure RISC-V processor
    • Multi-layered security model protects all core components against a wide range of attacks
    • Security model includes hierarchical privilege model, secure key management policy, hardware-enforced isolation/access control/protection, error management policy
    • State-of-the-art DPA resistance, FIA protection and anti-tamper techniques
    Block Diagram -- Programmable Root of Trust With DPA and FIA for US Defense
×
Semiconductor IP