Root of Trust IP
Welcome to the ultimate Root of Trust IP hub! Explore our vast directory of Root of Trust IP
All offers in
Root of Trust IP
Filter
Compare
20
Root of Trust IP
from 6 vendors
(1
-
10)
-
Root of Trust eSecure module for SoC security
- Secure Boot
- Firmware update in the field
- Secure key storage
-
Silicon Security Solution
- Secure Root of Trust
- Protect against cyber hacks, copying, cloning, trojans
- Flexible management and Upgrade path for features
-
External NOR flash protection solution that supports real-time decryption and execution in place
- Designed to provide the execution-in-place (XiP) capability of encrypted instructions in flash memory.
-
External NAND flash protection, designed to secure stored assets with a local key from PUF
- PUFenc is designed to protect external flash memory and its stored assets.
- The IP provides asset encryption, such as a learning model for AI or firmware for the chip with a local key from the PUF.
- It adds an additional layer of security by avoiding using the global key, which is a shared key among ICs after the chip leaves the manufacturing floor.
-
Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine
- PUFef is designed to protect embedded Flash with a Hardware Root of Trust and a lite crypto engine of RC6.
- The RC6 provides a comprehensive level of security while also minimizing overall size.
- Before attempting to hack the crypto engine, attackers would first have to destroy the embedded Flash.
-
Hardware Root of Trust IP
- Built-in standard APB controller with privilege control to create secure/non-secure separation. Additionally, interface customization is available for different design requirements.
- Four 256-bit hardware PUF chip fingerprints, include a self-health check that can be used as a unique identification(UID) or a root key(seed).
- High-quality true random number generator (TRNG)
- 8k-bit mass production OTP with built-in instant hardware encryption (customization available)
-
tRoot V500 Hardware Secure Module
- Complete hardware secure modules with Root of Trust give SoCs a unique, tamper-proof identity
- Enable secure services deployment
- Provide a Trusted Execution Environment to create, provision, store and manage keys
- Full hardware key protection
-
tRoot F022 Hardware Secure Module (w/ ARC EM22FS)
- ASIL B Certified tRoot Hardware Secure Module provides the Root of Trust for a system, protects against malicious attacks, and prevents random and systematic faults
- Meets stringent ISO 26262 safety process and documentation requirements (ASIL D systematic grade)
- Fully programmable solution safeguards against evolving threats with high-grade security
-
tRoot Hardware Secure Modules for iSIM
- Migrating from discrete SIM cards to an embedded iSIM solution reduces area, power, and cost
- Out-of-the-box connectivity using integrated bootstrap code within the HSM
- Leverages Truphone’s global network by bundling default connectivity profile on each chipset
- Factory-loaded bootstrap profile enables global connectivity, but not locked to Truphone
-
tRoot V023 FS Hardware Secure Module, ASIL-B compliant (w/ ARC EM22FS)
- ASIL B Certified tRoot Hardware Secure Module provides the Root of Trust for a system, protects against malicious attacks, and prevents random and systematic faults
- Meets stringent ISO 26262 safety process and documentation requirements (ASIL D systematic grade)
- Fully programmable solution safeguards against evolving threats with high-grade security