All IPs > Security IP > Platform Security
In today's digital world, the importance of platform security cannot be overstated. Platform security semiconductor IPs are essential for protecting electronic systems from an increasing array of threats. These IPs play a critical role in ensuring that systems remain secure by safeguarding data, communications, and applications from unauthorized access or malicious attacks.
Platform security IPs include a variety of solutions such as encryption engines, secure boot mechanisms, and trusted execution environments. These technologies work in harmony to validate the authenticity of hardware and software components, providing a comprehensive security framework for electronic devices. By integrating these security measures at a fundamental level, semiconductor IPs ensure that systems are resilient to tampering and meet stringent security standards.
The applications of platform security semiconductor IPs span across a multitude of industries. From consumer electronics like smartphones and smart home devices to critical infrastructure systems and automotive applications, robust security is imperative. These IPs are designed to address the security needs of both edge devices and cloud-based platforms, preserving the integrity and confidentiality of sensitive data as it is processed and transmitted.
In our Silicon Hub, you will find a diverse array of platform security semiconductor IPs tailored to meet varied security requirements. Whether you're looking to protect consumer devices or safeguard enterprise data centers, our cutting-edge IP solutions provide the reliability and flexibility needed to counteract evolving security threats. Explore our category to enhance your products with state-of-the-art security technologies.
Akida's Neural Processor IP represents a leap in AI architecture design, tailored to provide exceptional energy efficiency and processing speed for an array of edge computing tasks. At its core, the processor mimics the synaptic activity of the human brain, efficiently executing tasks that demand high-speed computation and minimal power usage. This processor is equipped with configurable neural nodes capable of supporting innovative AI frameworks such as convolutional and fully-connected neural network processes. Each node accommodates a range of MAC operations, enhancing scalability from basic to complex deployment requirements. This scalability enables the development of lightweight AI solutions suited for consumer electronics as well as robust systems for industrial use. Onboard features like event-based processing and low-latency data communication significantly decrease the strain on host processors, enabling faster and more autonomous system responses. Akida's versatile functionality and ability to learn on the fly make it a cornerstone for next-generation technology solutions that aim to blend cognitive computing with practical, real-world applications.
The Akida IP is a groundbreaking neural processor designed to emulate the cognitive functions of the human brain within a compact and energy-efficient architecture. This processor is specifically built for edge computing applications, providing real-time AI processing for vision, audio, and sensor fusion tasks. The scalable neural fabric, ranging from 1 to 128 nodes, features on-chip learning capabilities, allowing devices to adapt and learn from new data with minimal external inputs, enhancing privacy and security by keeping data processing localized. Akida's unique design supports 4-, 2-, and 1-bit weight and activation operations, maximizing computational efficiency while minimizing power consumption. This flexibility in configuration, combined with a fully digital neuromorphic implementation, ensures a cost-effective and predictable design process. Akida is also equipped with event-based acceleration, drastically reducing the demands on the host CPU by facilitating efficient data handling and processing directly within the sensor network. Additionally, Akida's on-chip learning supports incremental learning techniques like one-shot and few-shot learning, making it ideal for applications that require quick adaptation to new data. These features collectively support a broad spectrum of intelligent computing tasks, including object detection and signal processing, all performed at the edge, thus eliminating the need for constant cloud connectivity.
The aiWare NPU (Neural Processing Unit) by aiMotive is a high-performance hardware solution tailored specifically for automotive AI applications. It is engineered to accelerate inference tasks for autonomous driving systems, ensuring excellent performance across a variety of neural network workloads. aiWare delivers significant flexibility and efficiency, capable of scaling from basic Level 2 applications to complex multi-sensor Level 3+ systems. Achieving up to 98% efficiency, aiWare's design focuses on minimizing power utilization while maximizing core performance. It supports a broad spectrum of neural network architectures, including convolutional neural networks, transformers, and recurrent networks, making it suitable for diverse AI tasks in the automotive sphere. The NPU's architecture allows for minimal external memory access, thanks to its highly efficient dataflow design that capitalizes on on-chip memory caching. With a robust toolkit known as aiWare Studio, engineers can efficiently optimize neural networks without in-depth knowledge of low-level programming, streamlining development and integration efforts. The aiWare hardware is also compatible with V2X communication and advanced driver assistance systems, adapting to various operational needs with great dexterity. Its comprehensive support for automotive safety standards further cements its reputation as a reliable choice for integrating artificial intelligence into next-generation vehicles.
Overview: The Secure Enclave IPs are Common Criteria (CC) EAL5+PP0084/PP0117 and EAL5+PP0117 certification-ready Secure Enclaves, respectively. They are available as hard macros for seamless integration into SoCs. These Secure Enclave IPs provide the highest level of security for an SoC, incorporating patented design techniques and countermeasures against side-channel and perturbation attacks to ensure robust security while minimizing power consumption. Key Features: Cryptographic Hardware Accelerators: Efficiently support standard cryptography and security operations to increase throughput while adhering to power constraints and security requirements. BootROM and Secondary Boot Loader: Manage the certified life cycle of the Secure Enclave, enforcing and assuring security from manufacturing to deployment. Proprietary IP: Based on proprietary IP that is free of 3rd party rights and royalties. Benefits: The Secure Enclave IPs offer robust security measures, efficient cryptographic support, and secure life cycle management, making them ideal for applications that require the highest levels of security and reliability. Applications: The Secure Enclave IP is versatile and suitable for a wide range of applications, including but not limited to: Secured and Certified iSIM & iUICC EMVco Payment Hardware Cryptocurrency Wallets FIDO2 Web Authentication V2X HSM Protocols Smart Car Access Secured Boot Secure OTA Firmware Updates Secure Debug Any design requiring a Secure Enclave, Secure Element, or Hardware Root of Trust protected against side-channel and perturbation fault attacks. Compliance and Support: The Secure Enclave is compliant with and ready for CC EAL5+ and EMVCo certification. It is delivered with an SDK and pre-certified CryptoLibrary and secure Boot Loader for seamless integration and enhanced security.
Polar ID from Metalenz offers a cutting-edge face unlock solution, using advanced meta-optic technology to provide secure, high-resolution facial recognition capabilities. It captures the unique "polarization signature" of a human face, making it resistant to both 2D photos and sophisticated 3D masks. Polar ID operates efficiently in a variety of lighting conditions, from bright daylight to dark environments, ensuring its utility extends across all smartphone models without sacrificing security or user experience. This technology replaces complex structured light modules, incorporating a single near-infrared polarization camera and active illumination source. It significantly reduces costs and footprint, supporting a broad adoption across hundreds of millions of mobile devices. With its low price point and high performance, Polar ID elevates smartphone security, offering robust protection for digital transactions and identity verification. By enabling this on an embedded platform with compatibility for Qualcomm's Snapdragon processors, Metalenz ensures widespread applicability. The key advantage of Polar ID is its affordability and ease of integration, as it eliminates the need for larger, more intrusive notches in phone designs. Its sophisticated polarization sensing means secure authentication is possible even if the user wears sunglasses or masks. Polar ID sets a new benchmark in smartphone security by delivering convenience and enhanced protection, marking it as the first polarization sensor available for smartphones.
D2D® Technology, developed by ParkerVision, is a revolutionary approach to RF conversion that transforms how wireless communication operates. This technology eliminates traditional intermediary stages, directly converting RF signals to digital data. The result is a more streamlined and efficient communication process that reduces complexity and power consumption. By bypassing conventional analog-to-digital conversion steps, D2D® achieves higher data accuracy and reliability. Its direct conversion approach not only enhances data processing speeds but also minimizes energy usage, making it an ideal solution for modern wireless devices that demand both performance and efficiency. ParkerVision's D2D® technology continues to influence a broad spectrum of wireless applications. From improving the connectivity in smartphones and wearable devices to optimizing signal processing in telecommunication networks, D2D® is a cornerstone of ParkerVision's technological offerings, illustrating their commitment to advancing communication technology through innovative RF solutions.
FIPS 140-3 CAVP-compliant, compact PQC hardware acceleration for subsystems PQPlatform-CoPro combines hash-based and lattice-based post-quantum cryptography that can be added to an existing security subsystem. It can be optimized for minimum area, maintaining high-performance, and is designed to be run by an existing CPU using PQShield-supplied firmware, meaning it involves low integration effort and flexible configurations to support a wide variety of use cases, including quantum-safe secure boot. Solutions are available for hardware acceleration of SHA-3, SHAKE, ML-KEM, ML-DSA, alongside traditional cryptography. In addition, PQPlatform-CoPro can be configured with side-channel protection. PQPlatform-CoPro is covered by multiple PQShield implementation patents.
Specially engineered for the automotive industry, the NA Class IP by Nuclei complies with the stringent ISO26262 functional safety standards. This processor is crafted to handle complex automotive applications, offering flexibility and rigorous safety protocols necessary for mission-critical transportation technologies. Incorporating a range of functional safety features, the NA Class IP is equipped to ensure not only performance but also reliability and safety in high-stakes vehicular environments.
The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.
Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.
The Aeonic Integrated Droop Response System is a groundbreaking approach to managing voltage droop in complex IC environments. This solution combines fast multi-threshold detection with churn-key integration of fine-grained dynamic voltage and frequency scaling capabilities. It offers advanced features such as tight coupling of droop detection and response, leading to the fastest commercial adaptation times that can significantly reduce margin requirements and power usage. The system’s observability features provide valuable data for silicon health assessments and lifecycle management. Process portability ensures scalability across different technology nodes, making the solution versatile for use in various sophisticated systems. This system is crucial for managing droop-induced challenges, and its integration with current architectures leads to enhanced system power and performance efficiency.
FIPS 140-3 CAVP compliant ultra-fast, compact, and power efficient secure hash acceleration PQPlatform-Hash is a power side-channel accelerator, supporting a wide range of Hash-Based Signature Schemes (HBSS). PQPlatform-Hash deploys tried-and-tested HBSS including quantum-safe LMS and XMSS (not hybrid). It provides acceleration of HBSS in embedded devices, especially where high throughput is required, or resource constraints necessitate minimal additional area. For example, PQPlatform-Hash is a solution for secure first-stage boot loading with hash-based signature schemes. HBSS offer different trade-offs of memory/area to lattice-based schemes, and as a result, PQPlatform-Hash is ideally suited for smaller key sizes, larger signature sizes, and processing times for key generation, signature generation and verification.
The NS Class is Nuclei's crucial offering for applications prioritizing security and fintech solutions. This RISC-V CPU IP securely manages IoT environments with its highly customizable and secure architecture. Equipped to support advanced security protocols and functional safety features, the NS Class is particularly suited for payment systems and other fintech applications, ensuring robust protection and reliable operations. Its design follows the RISC-V standards and is accompanied by customizable configuration options tailored to meet specific security requirements.
Suite-Q SW is a versatile cryptographic software library designed to offer flexibility in code size, performance, and memory usage, making it an essential tool for developers working on resource-limited devices. Engineered for high adaptability, this software package provides a robust framework for implementing secure cryptographic operations across diverse platforms, including 8-bit to 64-bit processors. The library is meticulously crafted to support various configuration options that balance speed with memory efficiency, ensuring it meets custom specifications while preserving system integrity. Portable C code and high-speed, hand-optimized assembly variants are available to provide the ideal blend of compatibility and performance required in modern applications. Key features of Suite-Q SW include seamless integration as plug-in modules, support for a wide range of hardware offloads, and extensive compatibility with general-purpose and embedded CPUs. Validated through rigorous testing and performance measurements, it provides a reliable basis for secure software development, ensuring rapid deployment with minimized risk. As such, Suite-Q SW remains an indispensable part of PQSecure's comprehensive cryptographic offerings, perfect for adapting to the ever-changing landscape of digital security.
Suite-Q HW is a robust system-on-chip (SoC) solution that envelops all the necessary cryptography required for secure protocols within compact and efficient hardware. Targeted at both high-end servers and low-end embedded systems, this solution emphasizes the dual benefits of scalability and adaptability. Suite-Q HW efficiently offloads demanding symmetric and asymmetric cryptographic processes by leveraging specialized accelerators, offering enhanced execution speeds that cater to different application requirements. A key component of its utility lies in its support for a wide array of cryptographic operations. This includes classical public key methods, such as ECDSA and ECDH, alongside emerging post-quantum techniques within isogeny and lattice frameworks. The hardware is further augmented by secure hash algorithms and diverse AES encryption modes, delivering comprehensive protection across a variable security landscape. Incorporating optional Differential Power Analysis (DPA) countermeasures and validated security standards, Suite-Q HW ensures security for sensitive data against contemporary and emerging threats. It facilitates integration with existing development flows across SoCs and FPGAs, optimizing power and silicon footprint according to specific needs. Furthermore, the hardware package provides comprehensive resources for integration, from testbench data to simulation scripts, enhancing its adaptability and effectiveness in today's digital security paradigm.
NeoPUF is revolutionizing hardware security by providing up to 100 times faster random number generation. This advanced security technology plays a critical role in safeguarding semiconductor devices against emerging threats. It incorporates a hardware-based random number generator which powers the development of the next generation of secure chips, ensuring robust protection from unauthorized access. Positioned as a critical component in the development of secure semiconductors, NeoPUF integrates seamlessly into existing systems, offering a quantum-resilient solution. This capability is vital in defense against potential quantum-era threats, providing security that remains effective even as technology landscapes shift. NeoPUF supports operations across diverse applications, particularly in sensitive environments where data integrity is paramount. As part of PUFsecurity's comprehensive lineup, NeoPUF not only enhances secure storage options but also facilitates reliable identification and anti-cloning features. It is a key enabler of trusted computing across numerous industries, underlining its importance in the modern era where security is indispensable.
The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.
The DSHA2-512 core specializes in the SHA2-512 hashing algorithm, providing a highly efficient means to process hashing functions in data-intensive environments. It is designed to comply with FIPS PUB 180-4 standards, ensuring that it meets established guidelines for secure hashing operations necessary in a variety of industry settings. With interfaces that include APB, AHB, and AXI, the DSHA2-512 exhibits broad compatibility with existing digital infrastructures, enabling it to be deployed across a wide array of technology solutions. This core is ideal for sectors where ensuring data integrity and authenticity is critical, such as finance, governmental, and secure communications sectors. Its enhanced technical capabilities mean that the DSHA2-512 core supports extensive data processing requirements while maintaining the security integrity of hashes, making it an essential component for applications that demand reliable hash computation and data security.
The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.
Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.
Comcores' MACsec solution addresses the needs for secure communication on Ethernet links by implementing the IEEE 802.1AE standard for MAC Security. It provides comprehensive protection against eavesdropping and manipulation, making it suitable for applications demanding high security over public and private networks. Built to support various data rates, the MACsec IP core integrates robust cryptographic suites like AES-GCM to encrypt and authenticate network traffic. Its deployment ensures data confidentiality and integrity, fostering a secure environment for transmitting sensitive information such as in military communication systems and data centers.
The ZIA Stereo Vision technology is crafted for applications that require depth perception and accurate distance measuring. Utilizing stereo vision algorithms, it excels in generating 3D data from dual-camera setups, which is crucial for robots, drones, and autonomous vehicles. By employing advanced disparity mapping techniques, this technology ensures high fidelity in spatial analysis, making it particularly effective in dynamic environments. Its integration optimizes tasks that need real-time 3D depth information, aiding navigation and object placement.
The Security Protocol Accelerator from PQSecure is a pivotal component in enhancing the performance of cryptographic operations within embedded systems and processors. This accelerator facilitates the efficient execution of security protocols, such as post-quantum cryptographic algorithms, providing hardware-accelerated computation to offload intensive tasks from the main CPU. PQSecure's accelerator design focuses on optimizing the speed and efficiency of complex cryptographic tasks, including key exchange operations, digital signatures, and hashing. It is engineered to support a broad spectrum of cryptographic standards while maintaining configurability for various security and performance levels. This product stands out due to its ability to integrate seamlessly into various processor architectures and its compatibility with existing SoC and FPGA platforms. Key features of the Security Protocol Accelerator include customizable performance settings and support for both classical and post-quantum cryptographic operations. It provides significant improvements in power efficiency and computational speed, ensuring systems are prepared for future quantum challenges. With available side-channel attack countermeasures, this accelerator not only secures data but also mitigates potential vulnerabilities common in cryptographic implementations.
The DSHA2-256 core is a dedicated solution for hashing functions, specifically designed to excel in processing the SHA2-256 algorithm. Compliant with the FIPS PUB 180-4 standards, this universal core accelerates the hash operation, providing efficient and secure data processing options for diverse digital systems. Its architecture supports both APB, AHB, and AXI bus interfaces, allowing for easy integration into numerous applications that require robust hashing mechanisms. The core enhances processing capabilities, facilitating the rapid execution of secure hash functions that protect data integrity and authenticity. This IP core is invaluable in fields where data security and integrity are critical, such as banking, digital communication, and any networked environment where information verification is necessary. By providing dedicated hardware for hashing tasks, it ensures high levels of data protection and performance, making it an ideal choice for developers looking to implement reliable security solutions.
The Cramium Personal Hardware Security Module (PHSM) by CrossBar is an integrated security solution that enhances digital asset security through its advanced ReRAM technology. Built with the capability for Multi-Party Computation (MPC), the Cramium PHSM provides robust key protection by eliminating the need for key reconstruction, thus reducing vulnerability to attacks. Utilizing FIDO2 authentication, the module is designed with an offline-by-default architecture, ensuring high assurance levels in protecting sensitive data. This protection is particularly crucial for applications operating within decentralized systems where security is paramount. Combining innovative memory and cryptographic technology, the Cramium PHSM is crafted to meet varying compliance needs, making it ideal for industries such as finance, healthcare, and information technology. The module enhances tamper resistance for cryptographic operations, ensuring secure storage and operation of sensitive information within protected environments. One of its unique features is the ability to offer robust authentication without relying on external network connectivity, effectively insulating assets from unauthorized access. Cramium PHSM exemplifies CrossBar's commitment to developing secure solutions for complex challenges presented by modern computational demands. Its modular design enables easy customization and integration, catering to specific industry requirements and assuring enterprises of enhanced cryptographic functionalities. The module not only safeguards digital secrets but also introduces an improved fault-tolerant element that minimizes risk from potential breaches or exploits.
The Platform-Level Interrupt Controller (PLIC) by Roa Logic is a comprehensive solution for managing interrupt signals in sophisticated and large-scale computing environments. Compatible with RISC-V platforms, it is fully parameterised and offers an efficient means to handle and prioritize multiple interrupt sources. The PLIC's design emphasizes scalability and flexibility, allowing developers to adapt the module for a wide range of system requirements. The PLIC supports a configurable number of interrupt sources, each with customizable priority levels. This enables a tailored approach to the handling of critical interrupts, ensuring that high-priority tasks receive immediate attention. It serves as an essential building block for systems that demand precise and reliable interrupt management, making it indispensable in complex processor environments. With its easy integration into existing RISC-V platforms, the PLIC provides a seamless upgrade to traditional interrupt controllers. Its high level of adaptability ensures that it can be calibrated to complement specific system architectures, enhancing performance in varied operational scenarios.
NVM Defender is crafted to bolster the protection of non-volatile memory on integrated circuits against unauthorized access and data breaches. With a cutting-edge architecture, this product secures sensitive information stored within ICs, employing robust measures to counter invasive and non-invasive attack vectors. NVM Defender is pivotal in environments where data integrity and confidentiality are paramount, ensuring that sensitive data remains shielded from potential threats. The technology integrates seamlessly with various IC designs, providing a comprehensive security layer without affecting the performance of the primary device functions. It is engineered to withstand sophisticated threats, capturing and neutralizing attempts to access or alter stored data illicitly. Industries reliant on secure data transfer and storage leverage this product to maintain high levels of security across their hardware. Designed with adaptability in mind, NVM Defender can be implemented across different industries, offering scalable security solutions tailored to the specific demands of various fields such as automotive, aerospace, and consumer electronics.
FortiPKA-RISC-V is a powerful public key algorithm coprocessor designed to enhance cryptographic operations through streamlined modular multiplication techniques. This IP core offers robust protection against side-channel and fault injection attacks, ensuring high performance by eliminating Montgomery domain transformations. Engineered to maximize efficiency, FortiPKA-RISC-V supports a variety of cryptographic protocols, making it suitable for applications demanding high-speed data processing with minimal latency. Its architecture ensures seamless integration into systems requiring secure key exchanges and digital signature verifications, showcasing versatility across different computational platforms. Additionally, this coprocessor is built with a focus on reducing hardware footprint, making it ideal for space and power-conscious applications such as embedded systems and mobile devices. By aligning with industry-standard cryptographic requirements, FortiPKA-RISC-V provides an effective solution for environments requiring elevated security without compromising on computational speed or area efficiency.
The Column A/D Converter by CURIOUS Corporation is meticulously crafted for use with Image Sensors, enhancing the efficiency and accuracy of signal processing in imaging applications. This converter is integral to digital imaging systems, providing the capability to convert analog signals into digital data with high precision. One of the standout features of this product is its implementation of the Warp & Walk algorithm, which allows simultaneous high-speed and high-accuracy conversions. By integrating this unique processing method, the converter achieves minimal error rates and is capable of handling quick transitions, making it suitable for cutting-edge imaging solutions like digital cameras and industrial imaging systems. Engineers will appreciate its compact design, which enables seamless integration into tight spaces without compromising performance. The Column A/D Converter supports multiple resolutions and ensures compatibility with a broad range of image sensors, demonstrating its versatility in meeting diverse technological demands.
The Keccak Hash Engine is known for its versatility in cryptographic operations, supporting a broad range of functions beyond traditional hashing. Notably, it serves as a foundational element for hash functions, authentication, encryption, and pseudo-random number generation. This IP core employs the innovative sponge construction technique and the Keccak-f permutation, renowned for its simplicity and adaptability. Keccak has been internationally standardized within several specifications, including NIST's FIPS 202 for SHA-3 and the 3GPP TS 35.231 for mobile telecommunications. This extensive scrutiny and third-party analysis ensure its suitability for highly secure applications. The Keccak Hash Engine excels in scenarios demanding configurable security levels or output lengths, integrated seamlessly into various systems. Built for integration ease and robust security, the Keccak IP core operates within a single clock domain and comes extensively verified. It provides a strong foundation for applications in security, data integrity, blockchain technologies, and secure data storage, extending the potential of cryptographic protections within embedded systems.
The DSHA2-384 core is optimized for executing the SHA2-384 hash function, ensuring secure and efficient handling of hashing operations within digital systems. It fully complies with FIPS PUB 180-4 standards, ensuring adherence to widely recognized security protocols and making it ideal for industries that demand high standards of data protection. This IP core supports a variety of bus interfaces including APB, AHB, and AXI, providing compatibility with a broad range of system architectures. Its advanced security features enhance hashing processes, enabling rapid and secure management of data in applications that range from financial transactions to complex data security implementations. For security-focused applications, the DSHA2-384 core offers unmatched reliability and performance. It suits environments where data integrity is paramount, supporting industries that need robust digital security measures. The core facilitates secure communications and encrypted storage, making it a vital tool for safeguarding sensitive information in a digital-first world.
The Cryptographic COEsec Core is integral to substation automation systems, providing robust encryption and security features to safeguard data integrity and confidentiality within power distribution networks. It offers advanced cryptographic operations, ensuring that data transmissions remain secure from unauthorized access and tampering. Particularly relevant for utilities and infrastructure operations, the COEsec core supports a variety of cryptographic standards and protocols essential for protecting sensitive data as it moves through networked systems. With cyber threats increasingly posing risks to critical infrastructure, the core provides necessary security measures to mitigate potential vulnerabilities. This core's integration into substation automation systems is crucial, where securing communication between devices is paramount to system reliability. By deploying the Cryptographic COEsec core, operators can ensure that their data control and management processes remain uncompromised, thus maintaining the integrity of essential service operations.
The Securyzr Key Management System by Secure-IC is designed to provide robust management and protection of cryptographic keys within a wide array of systems. This system ensures that sensitive keys are securely generated, stored, and distributed, preventing unauthorized access and misuse while maintaining data confidentiality and integrity. Incorporating a variety of security mechanisms, the Securyzr Key Management System supports end-to-end encryption protocols and enables secure communication between devices. It is particularly beneficial for applications that demand high security, such as financial services, healthcare, and critical infrastructure. The system ensures compliance with international security standards, facilitating smooth implementation into existing IT infrastructures. The solution's flexibility allows for scalable deployment across different networks and systems, ensuring an adaptable approach to key management. By integrating this system, organizations can simplify the process of securing their keys, reduce the risk of breaches, and enhance their overall cyber defense posture. Enhanced features like lifecycle management and audit abilities make it a valuable tool for maintaining high security standards over time.
ReRAM Secure Keys from CrossBar deliver an innovative solution for secure computing, utilizing the unique properties of resistive random-access memory (ReRAM) to generate physically unclonable function (PUF) keys. These keys offer robust security, providing a high degree of randomness and stability essential for safeguarding modern electronic devices. CrossBar's secure keys adapt smoothly into existing semiconductor processes, particularly where traditional embedded flash memory solutions falter at smaller node sizes. Designed to withstand varied environmental conditions, ReRAM-based PUF keys resist tampering and sidestep the vulnerabilities associated with other traditional memory systems. They do not suffer from RF interference, providing an enhanced layer of security crucial for applications in automotive, data center, and industrial sectors. These secure keys reflect the powerful integration potential of ReRAM technology, ensuring data integrity under a wide range of operational environments. By leveraging the predictable characteristics of ReRAM, CrossBar ensures that these keys protect sensitive information against unauthorized extraction and mimicry. The secure key technology bolsters cryptographic processes, instilling confidence in secure boot and trusted platform modules. This innovative application of ReRAM underscores its versatility, enabling a new era of security measures in computational and smart device ecosystems.
This DES/3DES core is engineered to provide data encryption according to the NIST standards for DES and triple DES. It handles 64-bit blocks with options for using one, two, or three 56-bit keys and requires only about 3,000 gates, making it an economical choice for secure applications. With fully synchronous design capabilities and available in both source and netlist forms, the core supports various cipher modes including ECB, CBC, and CFB without needing external memory. Its small size and high throughput of 3 Gbps on a 750 MHz technology make it ideal for mobile communication systems and secure financial transactions.
The Integrated Secure Element (iSE) from Secure-IC serves as a comprehensive Root of Trust within System-on-Chip (SoC) architectures, delivering a fundamental layer of security. Embedded directly into the primary chip, the iSE facilitates essential security services such as secure boot, key management, and anti-tamper protection, providing a resilient shield against potential vulnerabilities. This technology is vital for ensuring that digital devices remain protected against both physical and digital intrusions. By isolating and protecting security-critical processes and information, the iSE helps maintain the integrity and confidentiality of data. It is highly valued in industries like automotive, IoT, and consumer electronics, where safeguarding data integrity and operational reliability is crucial. As cyber threats evolve, the iSE evolves with them, incorporating the latest encryption standards and defensive techniques. Its flexibility and robust architecture allow it to be deployed across various applications, making it a cornerstone of secure system design. Companies leverage the iSE to adhere to stringent security standards and maintain compliance with global security certifications.
Side-channel Attack Resistance technology by FortifyIQ focuses on defending cryptographic systems against unauthorized data breaches through physical observation. This protection suite is essential for devices targeted by side-channel metrics like power usage, electromagnetic emissions, or timing discrepancies, ensuring that sensitive data remains secure from spillover attacks. Developed with a keen understanding of modern attack vectors, this technology employs advanced countermeasures crafted from algorithmic optimizations and hardware-level enhancements. Each design component is thoroughly tested to close any vulnerabilities, protecting cryptographic keys and operations even under intense scrutiny from external attackers. FortifyIQ's Side-channel Attack Resistance solutions are a staple for environments with stringent security requirements, such as government, financial institutions, and defense sectors. By integrating these defenses, manufacturers can prevent leakage of critical information during cryptographic processes, maintaining a high level of trustworthiness and cyber resilience.
FortifyIQ's Fault Injection Attack Countermeasures are designed to shield cryptographic devices from manipulations that cause malfunctions and data breaches. These techniques form a core part of security architectures that need to withstand sophisticated hacking attempts aimed at faulting the operational framework of hardware systems. These countermeasures incorporate multilayered protections at both the hardware and software level. They detect and neutralize inconsistencies introduced by fault injection methods, ensuring continued security and reliable operation regardless of the attack sophistication. All solutions are rigorously analyzed to validate their efficacy against diverse fault models. Crucial for high-security contexts like data centers and financial systems, the implementation of Fault Injection Attack Countermeasures guarantees operational integrity and prevents attackers from exploiting hardware weaknesses. FortifyIQ’s offerings emphasize robustness without compromising performance or elevating complexity, essential for environments where reliability is paramount.
The AES IP core offers an ultracompact implementation of the Rijndael cipher, compliant with the NIST AES encryption standard. Designed to tackle 128-bit data blocks using 128 or 256-bit keys, this core is renowned for its small size of less than 3,000 gates in the base version. It includes key expansion functionality and supports encryption across various modes such as ECB, CBC, OFB, and CTR. With an emphasis on a fully synchronous design, the core facilitates straightforward integration, whether in source or netlist format, for both ASIC and FPGA platforms, offering optional data integrity and power attack resistance features.
The FortiMac suite provides advanced cryptographic solutions specifically designed for rigorous protection against differential power analysis and fault injection attacks. This IP core specializes in HMAC SHA2-based applications, offering state-of-the-art security features that ensure both reliability and compactness. FortiMac's strength lies in its use of algorithmic defenses that are resistant to advanced side-channel attacks. The IP is highly adaptable, suitable for integration in both new and existing security systems. By minimizing power usage and gate count, FortiMac is an optimal choice for devices with stringent power and area constraints, delivering efficient performance without sacrificing security integrity. This product supports all major SHA2 hash functions, providing flexibility for developers and ensuring comprehensive protection for various cryptographic operations. Additionally, the IP is crafted to align with the highest security certifications, making it a trusted choice for secure communication and data integrity in sensitive sectors such as finance, telecommunications, and defense.
The Agile Secure Element IP is a versatile security enclave designed for straightforward integration into SoCs, providing essential elements for secure operations. This customizable IP includes a secure processor, cryptographic engines, and mechanisms for key storage and trusted execution, tailored to fit a wide range of system architectures. It supports a variety of cryptographic standards, including symmetric and asymmetric algorithms, while offering configuration options for post-quantum cryptography. Its modularity and compliance-readiness position it as an optimal solution for enhancing the security posture of complex multi-core systems and embedded applications.
QRoot Lite is a lightweight and configurable root-of-trust IP tailored for resource-constrained microcontrollers and IoT devices. The solution provides comprehensive security features such as secure boot, device attestation, and sealed storage, all in alignment with the TCG MARS specification. Designed to minimize silicon footprint, QRoot Lite integrates seamlessly via standard industry interfaces, ensuring a rapid and cost-effective implementation conducive to meeting regulatory compliance standards. This IP is ideal for integrating secure elements in low-power and cost-sensitive environments, offering a secure solution for modern connected devices.
The KiviPQC-KEM represents KiviCore's cutting-edge approach to post-quantum cryptography, designed to provide robust security against both classical and quantum computing threats. This IP core supports the Module-Lattice-based Key Encapsulation Mechanism (ML-KEM), aligning with the stringent standards set by NIST FIPS 203. By enabling secure key exchanges over untrusted channels, KiviPQC-KEM forms the cornerstone of future-proof network security solutions. This IP core focuses on minimal logic utilization while delivering high performance and low latency through hardware acceleration. The integration of an AMBA AXI4-Lite interface ensures simple system inclusion, whether in ASIC or FPGA designs. The KiviPQC-KEM-Fast and KiviPQC-KEM-Tiny variants cater to different performance needs, optimizing either for rapid processing or resource efficiency. Applications for KiviPQC-KEM include quantum-resistant network infrastructures, secure public key infrastructures (PKI), and transport-level security protocols like TLS/SSL. Its design supports a comprehensive set of operations including key generation, encapsulation, and decapsulation, making it an invaluable resource in the evolving landscape of cryptographic security.
The Reed-Solomon Codec offers robust error correction capabilities essential for data integrity in digital communication systems. This codec is renowned for its ability to correct errors in block data transmissions, making it invaluable in environments where data corruption might occur. Commonly applied in storage solutions, broadcasting, and digital communications, the Reed-Solomon Codec supports the correction of both random and burst errors. Its effectiveness is seen in numerous standards, from Compact Discs to the transmission of digital television. It ensures that data can be recovered or retransmitted accurately, thereby maintaining high levels of data reliability. Incorporating the Reed-Solomon Codec into systems allows engineers to significantly reduce data loss and error rates, ensuring smooth and efficient communication across networks. It is a vital component in any application that demands high data fidelity and reliability.
The iShield Key is a versatile security solution designed to offer both digital and physical access control in one device. It simplifies authentication processes for IT systems, buildings, or secure printing solutions by integrating seamlessly into everyday workflows. The device supports features such as website, application, and online service security, making it an all-encompassing security key.
The UniqueID PUF Core from Cologne Chip is an innovative solution designed to leverage the inherent physical attributes of semiconductors to generate unique, unclonable identifiers. This Physically Unclonable Function (PUF) core utilizes microscopic, chip-specific variations that occur during manufacturing as a secure key, providing robust protection against cloning attacks for secure operations such as data encryption and verification. Implementing the UniqueID PUF Core in FPGA and ASIC environments enhances security architecture, enabling secure key storage and management without the need for costly and potentially vulnerable external security measures. This makes the PUF Core an attractive proposition in sectors where data security and integrity are paramount. The UniqueID PUF Core underscores Cologne Chip's commitment to advancing semiconductor security, offering a cost-effective and highly reliable solution for secure digital applications. By integrating this security feature, systems are better equipped to handle sensitive information with confidence, ensuring data remains protected from unauthorized access.
A pivotal offering from Chevin Technology, the ChevinID™ Silicon Security Solution addresses the comprehensive security needs of modern silicon devices. This solution is tailored to protect against a host of cybersecurity threats such as unauthorized access, code insertion, and data manipulation, thereby safeguarding intellectual property and data integrity throughout a product's lifecycle. This security solution integrates seamlessly with various chip designs, providing robust measures to verify authenticity, origin, and ensure secure operation from production to deployment. It is particularly valuable in sectors like defense and critical infrastructure where data security is paramount. By implementing advanced authentication and verification protocols, the ChevinID™ solution enhances the security fabric of semiconductor devices, ensuring resilience against potential cyber threats. This strategic integration helps not only in protecting assets but also in complying with stringent security regulations and standards.
The iShield Hardware Security Module (HSM) by Swissbit is a plug-and-play security feature designed for IoT devices, ensuring the safe storage of security keys used in device authentication and registration. This USB-based module offers a straightforward retrofit solution for enhancing the security of existing hardware designs. With the capability to securely store private keys and certificates, the iShield HSM ensures they are protected against unauthorized access and duplication. This makes the module an ideal choice for integrating into cloud-connected or embedded systems requiring heightened security standards. The iShield HSM's compact form factor belies its powerful capabilities, making it an excellent choice for IoT applications where secure data processing and transmission are essential. Its implementation supports the upgrading of AWS IoT Greengrass devices, reinforcing data integrity and security in network-connected environments.
The Security Upgrade Kit by Swissbit offers a straightforward retrofit solution for enhancing the security of embedded systems. Designed to integrate seamlessly with Linux-based applications, it leverages a microSD card to provide Security Level 2 protection for crucial data. This kit ensures that essential information such as configuration credentials, licenses, and external data are safeguarded from unauthorized access or duplication. It also supports the secure booting of firmware and applications, maintaining high data integrity across the system. Ideal for systems requiring bolstered hardware security, the Security Upgrade Kit facilitates robust encryption and access control measures to protect data against tampering and exploitation. Its ease of implementation and high level of protection make it an invaluable tool for developers looking to improve the security posture of embedded applications.
The iShield Key 2 is Swissbit’s newest iteration of their all-in-one security key, incorporating cutting-edge technology like MIFARE DESFire EV3 for top-tier security applications. It comes certified with FIPS 140-3 Level 3, ensuring maximum data protection and integrity for sensitive access scenarios. This security token is designed to deliver both digital and physical security in a seamless package, making it indispensable for environments requiring stringent security protocols. From network logins to secure building access, the iShield Key 2 is engineered to fortify the endpoint security strategies of businesses across the board. As technology evolves, the iShield Key 2 stays ahead, providing versatile features that cater to future security landscapes while enhancing user experience. It maintains a focus on usability, ensuring straightforward implementation along with highly secure authentication mechanisms.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
No credit card or payment details required.
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!