Log In

All IPs > Security IP > Security Subsystems

Advanced Security Subsystems Semiconductor IP

In the world of integrated circuits, Security Subsystems Semiconductor IPs play a vital role in ensuring the confidentiality, integrity, and authenticity of data. These subsystems are meticulously designed to be incorporated into larger systems, providing robust security features crucial for combating the ever-evolving cyber threats. They are essential for a wide array of applications, including IoT devices, automotive systems, and consumer electronics, which demand stringent security measures.

Security subsystems often include components such as encryption and decryption engines, secure boot mechanisms, key management systems, and hardware-based random number generators. These components work in harmony to secure data transactions and storage within an electronic device. By integrating such advanced security features directly into the silicon, device manufacturers can significantly enhance the overall security posture of their products.

Furthermore, these security IPs are not only about protecting sensitive data but also about ensuring device integrity. Features such as tamper detection, secure firmware update, and access control play critical roles in preventing unauthorized access and modifications. This is particularly important in sectors like automotive, where safety and privacy are paramount, and IoT, where devices are often part of a broader network and are susceptible to remote attacks.

Products in the Security Subsystems category offer versatile and scalable solutions that cater to varying security requirements. They are designed to address specific needs, whether it's for securing a smartphone, enabling safe digital payment services, or protecting a vehicle's communication protocols. By choosing the right security subsystem semiconductor IP, developers can build products that not only perform efficiently but also comply with the highest security standards in today's connected world.

All semiconductor IP

Polar ID Biometric Security System

Polar ID from Metalenz offers a cutting-edge face unlock solution, using advanced meta-optic technology to provide secure, high-resolution facial recognition capabilities. It captures the unique "polarization signature" of a human face, making it resistant to both 2D photos and sophisticated 3D masks. Polar ID operates efficiently in a variety of lighting conditions, from bright daylight to dark environments, ensuring its utility extends across all smartphone models without sacrificing security or user experience. This technology replaces complex structured light modules, incorporating a single near-infrared polarization camera and active illumination source. It significantly reduces costs and footprint, supporting a broad adoption across hundreds of millions of mobile devices. With its low price point and high performance, Polar ID elevates smartphone security, offering robust protection for digital transactions and identity verification. By enabling this on an embedded platform with compatibility for Qualcomm's Snapdragon processors, Metalenz ensures widespread applicability. The key advantage of Polar ID is its affordability and ease of integration, as it eliminates the need for larger, more intrusive notches in phone designs. Its sophisticated polarization sensing means secure authentication is possible even if the user wears sunglasses or masks. Polar ID sets a new benchmark in smartphone security by delivering convenience and enhanced protection, marking it as the first polarization sensor available for smartphones.

Metalenz Inc.
13 Categories
View Details

Securyzr iSSP

Securyzr iSSP is an integrated Security Services Platform designed by Secure-IC to offer comprehensive lifecycle management of device security. It provides zero-touch security lifecycle services that encompass provisioning, firmware updates, security monitoring, and device identity management. The platform employs a cloud-based architecture, enabling real-time updates and management of security protocols across a fleet of devices. Securyzr iSSP supports Post-Quantum Cryptography standards, ensuring readiness for future cryptographic challenges. This platform integrates seamlessly into diverse system environments, facilitating the protection of sensitive data through robust secure boot processes and key isolation techniques. It structures security around a core Root-of-Trust component named Securyzr iSE neo, which offers anti-tampering protection and dual computation for enhanced security. The platform aligns with an organization's security goals by providing customizable protective measures that are scalable to various applications. Securyzr iSSP is designed to maintain high security levels without compromising system performance or efficiency. By leveraging the latest advancements in cryptography and security protocols, it ensures the resiliency of systems against both physical and remote threats. This platform aids organizations in navigating the increasingly complex landscape of digital security challenges, providing a robust foundation for their cybersecurity strategies.

Secure-IC
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

eSi-Crypto

The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Aeonic Integrated Droop Response System

The Aeonic Integrated Droop Response System is a groundbreaking approach to managing voltage droop in complex IC environments. This solution combines fast multi-threshold detection with churn-key integration of fine-grained dynamic voltage and frequency scaling capabilities. It offers advanced features such as tight coupling of droop detection and response, leading to the fastest commercial adaptation times that can significantly reduce margin requirements and power usage. The system’s observability features provide valuable data for silicon health assessments and lifecycle management. Process portability ensures scalability across different technology nodes, making the solution versatile for use in various sophisticated systems. This system is crucial for managing droop-induced challenges, and its integration with current architectures leads to enhanced system power and performance efficiency.

Movellus
Analog Subsystems, Clock Synthesizer, DC-DC Converter, DLL, Peripheral Controller, Platform Security, PLL, SDRAM Controller, Security Subsystems
View Details

RISC-V CPU IP NS Class

The NS Class is Nuclei's crucial offering for applications prioritizing security and fintech solutions. This RISC-V CPU IP securely manages IoT environments with its highly customizable and secure architecture. Equipped to support advanced security protocols and functional safety features, the NS Class is particularly suited for payment systems and other fintech applications, ensuring robust protection and reliable operations. Its design follows the RISC-V standards and is accompanied by customizable configuration options tailored to meet specific security requirements.

Nuclei System Technology
CPU, Cryptography Cores, Embedded Security Modules, Microcontroller, Platform Security, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

ArrayNav Adaptive GNSS Solution

ArrayNav is at the forefront of GNSS enhancements, utilizing multiple antennas to improve the sensitivity and performance of navigation systems. This sophisticated technology significantly boosts GNSS accuracy in challenging environments such as urban canyons. By leveraging up to four antennas, ArrayNav mitigates multipath issues and strengthens signal reception, dramatically enhancing performance. The heart of ArrayNav's innovation lies in its ability to filter out unwanted signals like interference or jamming attempts, ensuring the precision of GNSS operations. As each antenna adds unique benefits, this system ensures reliable navigation across diverse scenarios, whether in open areas or densely constructed urban landscapes. ArrayNav's technology is pivotal in the automotive sector, especially within advanced driver-assistance systems (ADAS). By providing sharper, more reliable positioning data, it contributes to improved safety and efficiency in vehicular systems, showcasing its indispensable role in modern navigation.

EtherWhere Corporation
3GPP-5G, Arbiter, Bluetooth, CAN, CAN-FD, FlexRay, GPS, IEEE 1394, Mobile DDR Controller, NFC, Optical/Telecom, Photonics, Receiver/Transmitter, RF Modules, Security Subsystems, UWB, W-CDMA
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library designed to offer flexibility in code size, performance, and memory usage, making it an essential tool for developers working on resource-limited devices. Engineered for high adaptability, this software package provides a robust framework for implementing secure cryptographic operations across diverse platforms, including 8-bit to 64-bit processors. The library is meticulously crafted to support various configuration options that balance speed with memory efficiency, ensuring it meets custom specifications while preserving system integrity. Portable C code and high-speed, hand-optimized assembly variants are available to provide the ideal blend of compatibility and performance required in modern applications. Key features of Suite-Q SW include seamless integration as plug-in modules, support for a wide range of hardware offloads, and extensive compatibility with general-purpose and embedded CPUs. Validated through rigorous testing and performance measurements, it provides a reliable basis for secure software development, ensuring rapid deployment with minimized risk. As such, Suite-Q SW remains an indispensable part of PQSecure's comprehensive cryptographic offerings, perfect for adapting to the ever-changing landscape of digital security.

PQSecure Technologies, LLC
10 Categories
View Details

Suite-Q HW

Suite-Q HW is a robust system-on-chip (SoC) solution that envelops all the necessary cryptography required for secure protocols within compact and efficient hardware. Targeted at both high-end servers and low-end embedded systems, this solution emphasizes the dual benefits of scalability and adaptability. Suite-Q HW efficiently offloads demanding symmetric and asymmetric cryptographic processes by leveraging specialized accelerators, offering enhanced execution speeds that cater to different application requirements. A key component of its utility lies in its support for a wide array of cryptographic operations. This includes classical public key methods, such as ECDSA and ECDH, alongside emerging post-quantum techniques within isogeny and lattice frameworks. The hardware is further augmented by secure hash algorithms and diverse AES encryption modes, delivering comprehensive protection across a variable security landscape. Incorporating optional Differential Power Analysis (DPA) countermeasures and validated security standards, Suite-Q HW ensures security for sensitive data against contemporary and emerging threats. It facilitates integration with existing development flows across SoCs and FPGAs, optimizing power and silicon footprint according to specific needs. Furthermore, the hardware package provides comprehensive resources for integration, from testbench data to simulation scripts, enhancing its adaptability and effectiveness in today's digital security paradigm.

PQSecure Technologies, LLC
13 Categories
View Details

NeoPUF

NeoPUF is revolutionizing hardware security by providing up to 100 times faster random number generation. This advanced security technology plays a critical role in safeguarding semiconductor devices against emerging threats. It incorporates a hardware-based random number generator which powers the development of the next generation of secure chips, ensuring robust protection from unauthorized access. Positioned as a critical component in the development of secure semiconductors, NeoPUF integrates seamlessly into existing systems, offering a quantum-resilient solution. This capability is vital in defense against potential quantum-era threats, providing security that remains effective even as technology landscapes shift. NeoPUF supports operations across diverse applications, particularly in sensitive environments where data integrity is paramount. As part of PUFsecurity's comprehensive lineup, NeoPUF not only enhances secure storage options but also facilitates reliable identification and anti-cloning features. It is a key enabler of trusted computing across numerous industries, underlining its importance in the modern era where security is indispensable.

eMemory Technology Inc.
TSMC
16nm FFC/FF+
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QDID PUF

The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Digital Systems and Security Solutions

VeriSyno Microelectronics offers Digital Systems and Security Solutions designed to enhance the robustness and efficiency of modern digital applications. This comprehensive suite includes IPs for PSRAM interfaces, network protocols like vMAC, and security mechanisms, addressing the critical needs for secure and efficient digital communications. The digital solutions are engineered to meet stringent security protocols, ensuring data integrity and protection in various applications. VeriSyno's expertise in digital system design enables the development of reliable solutions that integrate seamlessly into existing infrastructures, enhancing both system performance and security. These solutions are suitable for a broad spectrum of digital applications, including consumer electronics, automotive, and industrial systems, where efficient data handling and security are paramount. With ongoing innovation, VeriSyno maintains its competitive edge by adapting to emerging industry requirements and introducing forward-thinking digital solutions.

VeriSyno Microelectronics Co., Ltd.
Cryptography Cores, Embedded Memories, Embedded Security Modules, NVM Express, Security Protocol Accelerators, Security Subsystems, V-by-One
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

IMG DXT GPU for Mobile Devices

The DXT GPU is specifically designed to deliver robust graphics capabilities on mobile devices, providing the perfect foundation for applications that demand high performance alongside power efficiency. Leveraging advanced ray tracing capabilities, it brings desktop-level rendering quality to portable devices, enhancing user experiences in gaming, AR, and VR settings without compromising battery life.

Imagination Technologies
2D / 3D, Audio Interfaces, Ethernet, GPU, H.265, Security Subsystems, Vision Processor
View Details

DAES

The DAES is a sophisticated cryptographic co-processor IP designed to implement the Rijndael encryption algorithm, which forms the basis of the Advanced Encryption Standard (AES). By supporting key sizes of both 128 and 256 bits, this core provides robust encryption capabilities through various cipher modes including ECB, CBC, CFB, OFB, and CTR, ensuring diverse applications can leverage these functionalities for enhanced data security. The DAES core is equipped with an internal key expansion module, allowing it to manage encryption and decryption operations efficiently. It offers seamless integration into APB, AHB, and AXI buses, enabling it to be easily incorporated into a wide variety of digital solutions where encryption is paramount. This IP core is adaptable, providing developers with a reliable and scalable solution to safeguard sensitive data across multiple platforms and environments. The DAES benefits sectors that heavily rely on encryption for secure transactions and communications, making it a valuable asset in industries like finance, government, and telecommunications.

Premium Vendor
DCD-SEMI
Cryptography Cores, Security Subsystems
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is an integrated security solution that enhances digital asset security through its advanced ReRAM technology. Built with the capability for Multi-Party Computation (MPC), the Cramium PHSM provides robust key protection by eliminating the need for key reconstruction, thus reducing vulnerability to attacks. Utilizing FIDO2 authentication, the module is designed with an offline-by-default architecture, ensuring high assurance levels in protecting sensitive data. This protection is particularly crucial for applications operating within decentralized systems where security is paramount. Combining innovative memory and cryptographic technology, the Cramium PHSM is crafted to meet varying compliance needs, making it ideal for industries such as finance, healthcare, and information technology. The module enhances tamper resistance for cryptographic operations, ensuring secure storage and operation of sensitive information within protected environments. One of its unique features is the ability to offer robust authentication without relying on external network connectivity, effectively insulating assets from unauthorized access. Cramium PHSM exemplifies CrossBar's commitment to developing secure solutions for complex challenges presented by modern computational demands. Its modular design enables easy customization and integration, catering to specific industry requirements and assuring enterprises of enhanced cryptographic functionalities. The module not only safeguards digital secrets but also introduces an improved fault-tolerant element that minimizes risk from potential breaches or exploits.

CrossBar Inc.
Cryptography Software Library, Embedded Security Modules, NVM Express, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiCrypt

FortiCrypt offers a robust and secure cryptographic framework specifically designed to thwart side-channel and fault injection attacks. This suite of cryptographic IP includes advanced protection mechanisms that ensure both high security and performance across various platforms. The IP core is meticulously engineered to deliver ultra-low power consumption, making it ideal for battery-operated and IoT devices. The FortiCrypt product line is versatile, supporting a wide array of cryptographic algorithms, including both classical and post-quantum variations. It integrates seamlessly with existing systems, requiring minimal integration overhead, and is validated to withstand real-world attacks. Its high bandwidth capacity, achieved through multi-pipeline architecture, makes FortiCrypt suitable for high-performance applications, ensuring rapid data throughput without compromising security. Furthermore, FortiCrypt's compliance with the highest industry standards, such as FIPS 140-3 and SESIP, assures its usage in applications requiring stringent security measures. Whether used for secure communication, data protection, or hardware defense, FortiCrypt establishes a fortress against unauthorized access and data breaches, demonstrating unparalleled resilience and efficiency.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

FortiPKA-RISC-V

FortiPKA-RISC-V is a powerful public key algorithm coprocessor designed to enhance cryptographic operations through streamlined modular multiplication techniques. This IP core offers robust protection against side-channel and fault injection attacks, ensuring high performance by eliminating Montgomery domain transformations. Engineered to maximize efficiency, FortiPKA-RISC-V supports a variety of cryptographic protocols, making it suitable for applications demanding high-speed data processing with minimal latency. Its architecture ensures seamless integration into systems requiring secure key exchanges and digital signature verifications, showcasing versatility across different computational platforms. Additionally, this coprocessor is built with a focus on reducing hardware footprint, making it ideal for space and power-conscious applications such as embedded systems and mobile devices. By aligning with industry-standard cryptographic requirements, FortiPKA-RISC-V provides an effective solution for environments requiring elevated security without compromising on computational speed or area efficiency.

FortifyIQ
11 Categories
View Details

Keccak Hash Engine

The Keccak Hash Engine is known for its versatility in cryptographic operations, supporting a broad range of functions beyond traditional hashing. Notably, it serves as a foundational element for hash functions, authentication, encryption, and pseudo-random number generation. This IP core employs the innovative sponge construction technique and the Keccak-f permutation, renowned for its simplicity and adaptability. Keccak has been internationally standardized within several specifications, including NIST's FIPS 202 for SHA-3 and the 3GPP TS 35.231 for mobile telecommunications. This extensive scrutiny and third-party analysis ensure its suitability for highly secure applications. The Keccak Hash Engine excels in scenarios demanding configurable security levels or output lengths, integrated seamlessly into various systems. Built for integration ease and robust security, the Keccak IP core operates within a single clock domain and comes extensively verified. It provides a strong foundation for applications in security, data integrity, blockchain technologies, and secure data storage, extending the potential of cryptographic protections within embedded systems.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PQPlatform - TrustSys

The only PQC-first RoT with silicon-proven SCA resistance, and FIA PQPlatform-TrustSys is a complete PQC-focused security system that provides architects with the tools needed for the quantum age, and beyond. PQPlatform-TrustSys is a fully updatable Root-of-Trust subsystem, containing advanced post-quantum (ML-KEM, ML-DSA) and classical cryptography (ECC and RSA – essential for hybrid and legacy protocols during transition), enabling bulk encryption, hash acceleration, advanced accelerators for symmetric cryptography, including AES, SHA-2, SHA-3, HMAC, and seamless integration with third-party components. With crypto agility in mind, PQPlatform-TrustSys helps with the PQ/T hybrid secure-boot use case and includes our world-leading fault-tolerance and power/EM side-channel attack countermeasures.

Premium Vendor
PQShield
Cryptography Cores, Security Subsystems
View Details

Substation Automation Systems Cryptographic COEsec

The Cryptographic COEsec Core is integral to substation automation systems, providing robust encryption and security features to safeguard data integrity and confidentiality within power distribution networks. It offers advanced cryptographic operations, ensuring that data transmissions remain secure from unauthorized access and tampering. Particularly relevant for utilities and infrastructure operations, the COEsec core supports a variety of cryptographic standards and protocols essential for protecting sensitive data as it moves through networked systems. With cyber threats increasingly posing risks to critical infrastructure, the core provides necessary security measures to mitigate potential vulnerabilities. This core's integration into substation automation systems is crucial, where securing communication between devices is paramount to system reliability. By deploying the Cryptographic COEsec core, operators can ensure that their data control and management processes remain uncompromised, thus maintaining the integrity of essential service operations.

Concurrent EDA, LLC
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Low Power Security Engine

The Low Power Security Engine is designed by Low Power Futures to provide robust security for IoT devices while maintaining minimal power usage. Focusing on compact and comprehensive security capabilities, it supports elliptic-curve based cryptographic algorithms, including ECDHE (Elliptic-Curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm). The design is perfect for ensuring secure operations in constrained environments like RFID systems and embedded SIM cards, offering side-channel and timing attack resistance, thus securing sensitive data in demanding applications like IIoT and connected infrastructure.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr Key Management System

The Securyzr Key Management System by Secure-IC is designed to provide robust management and protection of cryptographic keys within a wide array of systems. This system ensures that sensitive keys are securely generated, stored, and distributed, preventing unauthorized access and misuse while maintaining data confidentiality and integrity. Incorporating a variety of security mechanisms, the Securyzr Key Management System supports end-to-end encryption protocols and enables secure communication between devices. It is particularly beneficial for applications that demand high security, such as financial services, healthcare, and critical infrastructure. The system ensures compliance with international security standards, facilitating smooth implementation into existing IT infrastructures. The solution's flexibility allows for scalable deployment across different networks and systems, ensuring an adaptable approach to key management. By integrating this system, organizations can simplify the process of securing their keys, reduce the risk of breaches, and enhance their overall cyber defense posture. Enhanced features like lifecycle management and audit abilities make it a valuable tool for maintaining high security standards over time.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Stellar Packet Classification Platform

The Stellar Packet Classification Platform provides ultra-high-speed packet processing capabilities for FPGAs, essential for sophisticated network applications requiring rapid address lookups and complex rule evaluations. This platform supports high-throughput scenarios with capabilities for handling millions of rules and performing extensive lookups with exceptionally high accuracy and reliability. Designed to accommodate IPV4/6 address lookup as well as implementing Access Control Lists and Longest Prefix Match functionalities, the Stellar platform ensures seamless packet flow in network environments. With performance extending from 25Gbps to over 1Tbps, this classification engine enables real-time packet analytics and decision making. Utilized in high-reliability areas such as firewall systems and anti-DDoS measures, the Stellar platform ensures networks operate smoothly under demanding conditions. The integration of live updates and 480-bit key support further enhances its utility in both current and evolving network architectures, making it a valuable asset for operators seeking robust data security and traffic management solutions.

Peraso Inc.
13 Categories
View Details

ReRAM Secure Keys

ReRAM Secure Keys from CrossBar deliver an innovative solution for secure computing, utilizing the unique properties of resistive random-access memory (ReRAM) to generate physically unclonable function (PUF) keys. These keys offer robust security, providing a high degree of randomness and stability essential for safeguarding modern electronic devices. CrossBar's secure keys adapt smoothly into existing semiconductor processes, particularly where traditional embedded flash memory solutions falter at smaller node sizes. Designed to withstand varied environmental conditions, ReRAM-based PUF keys resist tampering and sidestep the vulnerabilities associated with other traditional memory systems. They do not suffer from RF interference, providing an enhanced layer of security crucial for applications in automotive, data center, and industrial sectors. These secure keys reflect the powerful integration potential of ReRAM technology, ensuring data integrity under a wide range of operational environments. By leveraging the predictable characteristics of ReRAM, CrossBar ensures that these keys protect sensitive information against unauthorized extraction and mimicry. The secure key technology bolsters cryptographic processes, instilling confidence in secure boot and trusted platform modules. This innovative application of ReRAM underscores its versatility, enabling a new era of security measures in computational and smart device ecosystems.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Other, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Geon Secure Execution Processor

The Geon Secure Execution Processor is a sophisticated security solution designed to offer cryptographic protection for sensitive data. Built on the proven BA22 architecture, this processor delivers superior processing efficiency, achieving 1.79 DMIPS/MHz and operating at speeds exceeding 450 MHz in 65 nm technology. Its design ensures cryptographic isolation of data, which is crucial for maintaining security across diverse applications. This processor is verified at the system level, making it suitable for various security demands. It incorporates multiple secure elements to protect against unauthorized access while maintaining optimal performance metrics. The Geon processor is an integral part of Beyond Semiconductor's robust security offerings, reflecting the company's commitment to providing comprehensive security solutions tailored to modern technological demands. By seamlessly integrating cryptographic safeguards, the Geon processor stands out as an indispensable asset for systems requiring a high level of data security and integrity. Its ability to function efficiently under demanding conditions makes it a preferable choice for developers aiming to protect their systems against evolving cyber threats.

Beyond Semiconductor
TSMC
65nm
CPU, Cryptography Cores, Embedded Security Modules, Processor Cores, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Integrated Secure Element

The Integrated Secure Element (iSE) from Secure-IC serves as a comprehensive Root of Trust within System-on-Chip (SoC) architectures, delivering a fundamental layer of security. Embedded directly into the primary chip, the iSE facilitates essential security services such as secure boot, key management, and anti-tamper protection, providing a resilient shield against potential vulnerabilities. This technology is vital for ensuring that digital devices remain protected against both physical and digital intrusions. By isolating and protecting security-critical processes and information, the iSE helps maintain the integrity and confidentiality of data. It is highly valued in industries like automotive, IoT, and consumer electronics, where safeguarding data integrity and operational reliability is crucial. As cyber threats evolve, the iSE evolves with them, incorporating the latest encryption standards and defensive techniques. Its flexibility and robust architecture allow it to be deployed across various applications, making it a cornerstone of secure system design. Companies leverage the iSE to adhere to stringent security standards and maintain compliance with global security certifications.

Secure-IC
Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Side-channel Attack Resistance

Side-channel Attack Resistance technology by FortifyIQ focuses on defending cryptographic systems against unauthorized data breaches through physical observation. This protection suite is essential for devices targeted by side-channel metrics like power usage, electromagnetic emissions, or timing discrepancies, ensuring that sensitive data remains secure from spillover attacks. Developed with a keen understanding of modern attack vectors, this technology employs advanced countermeasures crafted from algorithmic optimizations and hardware-level enhancements. Each design component is thoroughly tested to close any vulnerabilities, protecting cryptographic keys and operations even under intense scrutiny from external attackers. FortifyIQ's Side-channel Attack Resistance solutions are a staple for environments with stringent security requirements, such as government, financial institutions, and defense sectors. By integrating these defenses, manufacturers can prevent leakage of critical information during cryptographic processes, maintaining a high level of trustworthiness and cyber resilience.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures are designed to shield cryptographic devices from manipulations that cause malfunctions and data breaches. These techniques form a core part of security architectures that need to withstand sophisticated hacking attempts aimed at faulting the operational framework of hardware systems. These countermeasures incorporate multilayered protections at both the hardware and software level. They detect and neutralize inconsistencies introduced by fault injection methods, ensuring continued security and reliable operation regardless of the attack sophistication. All solutions are rigorously analyzed to validate their efficacy against diverse fault models. Crucial for high-security contexts like data centers and financial systems, the implementation of Fault Injection Attack Countermeasures guarantees operational integrity and prevents attackers from exploiting hardware weaknesses. FortifyIQ’s offerings emphasize robustness without compromising performance or elevating complexity, essential for environments where reliability is paramount.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Subsystems
View Details

FortiMac

The FortiMac suite provides advanced cryptographic solutions specifically designed for rigorous protection against differential power analysis and fault injection attacks. This IP core specializes in HMAC SHA2-based applications, offering state-of-the-art security features that ensure both reliability and compactness. FortiMac's strength lies in its use of algorithmic defenses that are resistant to advanced side-channel attacks. The IP is highly adaptable, suitable for integration in both new and existing security systems. By minimizing power usage and gate count, FortiMac is an optimal choice for devices with stringent power and area constraints, delivering efficient performance without sacrificing security integrity. This product supports all major SHA2 hash functions, providing flexibility for developers and ensuring comprehensive protection for various cryptographic operations. Additionally, the IP is crafted to align with the highest security certifications, making it a trusted choice for secure communication and data integrity in sensitive sectors such as finance, telecommunications, and defense.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Secure Hash Function Core

The SHA-3 Secure Hash Function Core is a fundamental building block for cryptographic operations, conforming to the latest security standards, including FIPS 180-4 and FIPS 202. This core supports a comprehensive range of standard functions such as SHA3-224, SHA3-256, SHA3-384, SHA3-512, and the extendable-output functions SHAKE-128 and SHAKE-256. It operates efficiently with up to 48 Mbit/MHz throughput and uses a minimal gate area of just 28,000, providing a compact yet powerful solution for embedding in security-critical applications. The flexibility in its design ensures it can be effectively incorporated into a variety of systems, offering high performance without excessive resource usage. The SHA-3 core represents a secure solution for developers needing robust cryptographic integrity within their systems, balancing high-speed processing with compactness and economic use of silicon real estate.

Beyond Semiconductor
TSMC
130nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Agile Secure Element

The Agile Secure Element IP is a versatile security enclave designed for straightforward integration into SoCs, providing essential elements for secure operations. This customizable IP includes a secure processor, cryptographic engines, and mechanisms for key storage and trusted execution, tailored to fit a wide range of system architectures. It supports a variety of cryptographic standards, including symmetric and asymmetric algorithms, while offering configuration options for post-quantum cryptography. Its modularity and compliance-readiness position it as an optimal solution for enhancing the security posture of complex multi-core systems and embedded applications.

Crypto Quantique
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QRoot Lite

QRoot Lite is a lightweight and configurable root-of-trust IP tailored for resource-constrained microcontrollers and IoT devices. The solution provides comprehensive security features such as secure boot, device attestation, and sealed storage, all in alignment with the TCG MARS specification. Designed to minimize silicon footprint, QRoot Lite integrates seamlessly via standard industry interfaces, ensuring a rapid and cost-effective implementation conducive to meeting regulatory compliance standards. This IP is ideal for integrating secure elements in low-power and cost-sensitive environments, offering a secure solution for modern connected devices.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key

The iShield Key is a versatile security solution designed to offer both digital and physical access control in one device. It simplifies authentication processes for IT systems, buildings, or secure printing solutions by integrating seamlessly into everyday workflows. The device supports features such as website, application, and online service security, making it an all-encompassing security key.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

DesignHaven Security IP

Foresemi's DesignHaven™ security IP series is mainly used to protect hardware data security, including mainstream international and domestic cryptographic algorithm computing modules that meet major standards. The series supports cutting-edge technologies such as CryptRoT and PQC based on CIM, deployable in ASIC or FPGA. Foresemi offers both independent IP and subsystem-level solutions compatible with ARM or RISC-V CPU. Features include Public Key Cryptography, Symmetric cipher SCE, and True Random Number Generators.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details

FortiCrypt Library

The FortiCrypt Library is a sophisticated suite of cryptographic tools engineered to provide secure software implementations resistant to power and fault analysis. With an emphasis on flexibility and efficiency, it facilitates secure cryptographic operations without specialized hardware. The library is adaptable to a variety of environments, from embedded systems to high-capacity servers. By focusing on ultra-low power consumption and streamlined integration, it offers an excellent solution for developers looking to bolster their software against potential vulnerabilities without redesigning existing hardware. This toolset is designed to enable secure data processing across a multitude of applications, particularly where the implementation of physical security measures is impractical. With its robustness firmly grounded in industry standards, the FortiCrypt Library is especially suited for deployment in sectors like automotive and industrial automation, where reliable software security is critical.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

iShield HSM

The iShield Hardware Security Module (HSM) by Swissbit is a plug-and-play security feature designed for IoT devices, ensuring the safe storage of security keys used in device authentication and registration. This USB-based module offers a straightforward retrofit solution for enhancing the security of existing hardware designs. With the capability to securely store private keys and certificates, the iShield HSM ensures they are protected against unauthorized access and duplication. This makes the module an ideal choice for integrating into cloud-connected or embedded systems requiring heightened security standards. The iShield HSM's compact form factor belies its powerful capabilities, making it an excellent choice for IoT applications where secure data processing and transmission are essential. Its implementation supports the upgrading of AWS IoT Greengrass devices, reinforcing data integrity and security in network-connected environments.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Hardware Security Module

The Hardware Security Module (HSM) provides a robust security infrastructure for digital systems, featuring functions that support cryptographic key storage, boot authentication, and system supervision. This module is crucial for protecting sensitive information and ensuring system integrity, especially in high-security environments like space missions or government networks. Built to integrate seamlessly into complex systems, the HSM offers a comprehensive suite of security features that address various digital threats. Its design ensures encryption processes run efficiently without impacting overall system performance, preserving both speed and data confidentiality. By leveraging the GRLIB IP library, the HSM accelerates the development and deployment of secure systems, offering developers pre-configured tools that shorten time-to-market. The module's high adaptability and trusted protection mechanisms make it an ideal solution for sophisticated digital security applications.

Frontgrade Gaisler
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

AES XP-DPA-FIA

AES XP-DPA-FIA is a highly refined encryption module designed by FortifyIQ to fortify against side-channel and fault injection attacks. This core is particularly notable for delivering ultra-high bandwidth, making it a superior choice for applications requiring rapid and secure data processing. The IP leverages a multi-pipeline architecture, which allows it to sustain high throughput rates while maintaining robustness against unauthorized access. Its architecture enhances encryption efficiency, delivering optimal security for sensitive data transfers in high-performance computing environments. Certified by rigorous security standards, AES XP-DPA-FIA is tailored to meet the demands of modern electronic security needs. It is an invaluable component in sectors such as telecommunications and government operations, where data integrity and speed are critical.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Security Upgrade Kit

The Security Upgrade Kit by Swissbit offers a straightforward retrofit solution for enhancing the security of embedded systems. Designed to integrate seamlessly with Linux-based applications, it leverages a microSD card to provide Security Level 2 protection for crucial data. This kit ensures that essential information such as configuration credentials, licenses, and external data are safeguarded from unauthorized access or duplication. It also supports the secure booting of firmware and applications, maintaining high data integrity across the system. Ideal for systems requiring bolstered hardware security, the Security Upgrade Kit facilitates robust encryption and access control measures to protect data against tampering and exploitation. Its ease of implementation and high level of protection make it an invaluable tool for developers looking to improve the security posture of embedded applications.

Swissbit AG
2D / 3D, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key 2

The iShield Key 2 is Swissbit’s newest iteration of their all-in-one security key, incorporating cutting-edge technology like MIFARE DESFire EV3 for top-tier security applications. It comes certified with FIPS 140-3 Level 3, ensuring maximum data protection and integrity for sensitive access scenarios. This security token is designed to deliver both digital and physical security in a seamless package, making it indispensable for environments requiring stringent security protocols. From network logins to secure building access, the iShield Key 2 is engineered to fortify the endpoint security strategies of businesses across the board. As technology evolves, the iShield Key 2 stays ahead, providing versatile features that cater to future security landscapes while enhancing user experience. It maintains a focus on usability, ensuring straightforward implementation along with highly secure authentication mechanisms.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Input/Output Controller, Platform Security, Security Subsystems
View Details

PUFcc7

PUFcc7 represents the latest evolution in PUFsecurity's line of crypto coprocessors, offering enhanced support for modern security protocols such as TLS1.3. This coprocessor extends the capabilities of its predecessors by upgrading its public-key cryptography, hash, and message authentication code algorithms, thus ensuring heightened security performance. Notably, PUFcc7 supports emergent algorithms such as EdDSA and X25519, while also providing configurable performance settings to adapt to varied security demands. Designed to maintain robust operation throughout a device's lifecycle, PUFcc7 is integral to efficient, secure device management, encompassing secure boot, instant and indirect key wrapping, and encryption data protection. Its API-driven design and ease of integration into existing systems make it a versatile choice for advanced security architectures.

PUFsecurity
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Digital PUF

The Digital PUF IP by Crypto Quantique provides a minimal-area, logic-based solution for generating unclonable seeds and establishing device identity. It supports integration into any SoC, offering secure boot and cryptographic key generation with a remarkably low silicon footprint. The Digital PUF works by leveraging static mismatches in logic cells to create high-entropy bitstrings unique to each device, complete with built-in error correction for dependable seed regeneration. This IP is particularly suited for applications requiring compliance with NIST standards for entropy and randomness, making it an ideal fit for secure device authentication and cryptography.

Crypto Quantique
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

iShield Key MIFARE FIDO Security Token

The iShield Key MIFARE FIDO Security Token integrates cutting-edge FIDO security principles with MIFARE DESFire capabilities to offer a comprehensive solution for both personal and enterprise-level security. This hybrid security token can handle authentication tasks across various platforms while ensuring streamlined identity management. Its design is aimed at providing highly secure access to networks, applications, and buildings, combining multiple layers of security in a single, portable device. The token's robust build and encryption features make it ideal for use in environments where data integrity and security are of utmost importance. This device facilitates secure, touch-based authentication, supporting systems that are compliant with FIDO protocols and MIFARE technologies. The iShield Key MIFARE is also future-proof, equipped to meet evolving security threats while maintaining user convenience and accessibility.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt