Root of Trust IP

Welcome to the ultimate Root of Trust IP hub! Explore our vast directory of Root of Trust IP
All offers in Root of Trust IP
Filter
Filter

Login required.

Sign in

Login required.

Sign in

Compare 12 Root of Trust IP from 6 vendors (1 - 10)
  • Root of Trust eSecure module for SoC security
    • Secure Boot
    • Firmware update in the field
    • Secure key storage
    Block Diagram -- Root of Trust eSecure module for SoC security
  • Silicon Security Solution
    • Secure Root of Trust
    • Protect against cyber hacks, copying, cloning, trojans
    • Flexible management and Upgrade path for features
    Block Diagram -- Silicon Security Solution
  • External NOR Flash Protection
    • Designed to provide the execution-in-place (XiP) capability of encrypted instructions in flash memory.
    Block Diagram -- External NOR Flash Protection
  • External NAND Flash Protection
    • Designed to protect external flash memory and its stored assets
    Block Diagram -- External NAND Flash Protection
  • Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine
    • PUFef is designed to protect embedded flash with the hardware root of trust and a lite crypto engine of RC6.
    Block Diagram -- Embedded Flash Protection with Hardware Root of Trust and Lite Crypto Engine
  • PUF-based Hardware Root of Trust
    • PUF-based Unique ID
    • PUF-based True Random Number Generator
    • PUF-based Secure Key Storage
    Block Diagram -- PUF-based Hardware Root of Trust
  • Via-PUF Security Chip for Root of Trust
    • Device authentication by sym. and asym. cryptography.
    • Firmware protection
    • Data encryption
    • Anti-counterfeiting
    Block Diagram -- Via-PUF Security Chip for Root of Trust
  • Root of Trust Solutions
    • Custom-designed 32-bit secure processor
    • Security model includes hierarchical privilege model, secure key management policy, hardware-enforced isolation/access control/protection, error management policy
    • Anti-tamper and DPA-resistance protection
    • Multi-layered security model protects all core components against a wide range of attacks
    Block Diagram -- Root of Trust Solutions
  • tRoot Vx Hardware Secure Modules
    • The Synopsys tRoot Vx HSMs include a highly secure hardware Root of Trust that enables devices to boot securely and permits encryption and decryption of sensitive data allowing it to be stored in non-secure devices or memory. It provides a completely secure environment in a non-secure system from which applications can execute secure cryptographic services.
    • The tRoot Vx HSMs secure SoCs by using unique code protection mechanisms that provide run-time tamper detection and response. Code privacy protection is achieved without the added cost of dedicated secure memory. This unique feature reduces system complexity and cost by allowing the tRoot Vx HSM’s firmware to reside in any non-secure memory space.
    • Commonly, tRoot Vx programs reside in shared system DDR memory. Due to the confidentiality and integrity provisions of the secure instruction controller, this memory is effectively private to the HSM and impervious to attempts to modify it originating in other subsystems in the chip, or from outside. The tRoot Vx HSM’s ROM-less architecture can support system design changes at any time without risk of exposing the system memory to threats and without additional engineering development cost. To minimize the number of attack vectors, tRoot Vx HSMs use a simple interface with a limited set of interactions with the host processor.
  • tRoot Fx Hardware Secure Modules: Programmable Root of Trust
    • Efficient ARC SEM Security Processor
    • SoC host and peripheral interfaces
    • APEX cryptography acceleration (CryptoPack)
    • Clock and reset management
×
Semiconductor IP