TRNG IP
Filter
Compare
35
IP
from 16 vendors
(1
-
10)
-
True Random Number Generator (TRNG)
- Compact Size
- Autonomous Operation
- Parameterizability
-
Digital True Random Number Generator (TRNG), compliant with NIST SP800-90
- Fully Digital and based on standard cells
- Compliant with: AIS-31 (PTG.1 to PTG.3), NIST FIPS 140-3, NIST SP 800-90, GM/T 0005-2015
- Robust against process, temperature and voltage variations
- Post-silicon fine tuning to ensure high-level functional safety
-
The True Random Number Generator (TRNG) Digital Noise Source
- Robust, low-footprint, standard-cell based entropy source
- Entropy generation through thermal noise extraction
-
True Random Number Generator (TRNG) Digital Post Processing compliant with the FIPS 140-2 and AIS 31 standards
- State-of-the-art TRNG post-processing
- Fully compliant with the AIS 31 classes PTG.1 and PTG.2
-
True Random Number Generator (TRNG) Analog Noise Source
- robust, fully-integrated, state-of-the-art physical entropy source
- differential jitter extraction through a PLL-based fully symmetric architecture
- stochastic model of the entropy source for AIS 31 certification
- asynchronous random clock signal output
-
TRNG fully compliant with NIST 800-22
- ASIC or FPGA target
- Generates 256 random bits at a time
- Multiple ring oscillators with post processing for true random bit generation
- Fully compliant with latest NIST 800-22 800-22 and Diehard Random test suite
-
True Random Number Generator
- Patented test circuits on the oscillators to detect lockingto periodic signals.
- Repeating output data detection on NRBG and DRBG (compliant with [FIPS 140-2]).
- Hardware implemented ‘Repetition Count’ and ‘Adaptive Proportion’ tests on the Noise Source (compliant with [SP 800-90B]).
- Continuous tests on the Noise Source (compliant with [AIS-31]): ‘monobit test’, ‘poker test’, ‘runs test’, ‘longruns test’ and ‘Noise Source failure’.
-
Secure-IC's Securyzr Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
- Scalable architecture and crypto engines for optimal performance/resource usage
- Configurable for perfect application fit
- 100% CPU offload with low latency and high throughput
- DPA countermeasures Full software/driver support
-
PUF-based Hardware Root of Trust
- PUF-based Unique ID
- PUF-based True Random Number Generator
- PUF-based Secure Key Storage