Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Embedded Security Modules

Embedded Security Modules Semiconductor IP

In today's interconnected technological landscape, the security of embedded systems has emerged as a crucial challenge. This is where Embedded Security Modules (ESMs) in semiconductor IPs play a pivotal role. These modules are specialized components integrated into chips, offering enhanced protection against a variety of threats including unauthorized access, data breaches, and malicious attacks. By embedding security at the silicon level, these IPs provide a hardware root of trust, ensuring that the integrity, confidentiality, and authenticity of data and communications are uncompromised.

Embedded Security Modules are used across a spectrum of applications, catering to industries such as IoT, automotive, telecommunications, and consumer electronics. In the IoT realm, these modules protect smart devices from vulnerabilities and ensure secure data transmission between interconnected gadgets. In the automotive sector, ESMs safeguard vehicular communication systems and onboard diagnostics from hacking attempts. Similarly, telecommunications networks utilize these modules to establish secure channels and prevent espionage, maintaining the privacy of sensitive communications.

The products found within this category include a range of security-enhancing solutions such as secure boot processors, cryptographic accelerators, hardware random number generators, and secure element IPs. These products are designed to address specific security needs, offering flexibility and scalability to developers and manufacturers. For instance, secure boot processors ensure that only authenticated software runs on a device, while cryptographic accelerators speed up data encryption and decryption processes, vital for real-time secure communications.

Moreover, as digital threats evolve, Embedded Security Modules semiconductor IPs continue to advance, incorporating cutting-edge technologies like quantum encryption readiness and machine learning-led anomaly detection. This ongoing innovation not only fortifies existing systems but also prepares them for future challenges, making Embedded Security Modules a cornerstone of secure electronic design for years to come. Whether you are developing chips for personal gadgets or intricate industrial systems, integrating these security IPs ensures robust protection and compliance with stringent security standards, enhancing consumer trust and product reliability.

All semiconductor IP
53
IPs available

ADAS and Autonomous Driving

KPIT offers a comprehensive solution for Autonomous Driving and Advanced Driver Assistance Systems. This suite facilitates the widespread adoption of Level 3 and above autonomy in vehicles, providing high safety standards through robust testing and validation frameworks. The integration of AI-driven decision-making extends beyond perception to enhance the intelligence of autonomous systems. With a commitment to addressing existing challenges such as localization issues, AI limitations, and validation fragmentation, KPIT empowers automakers to produce vehicles that are both highly autonomous and reliable.

KPIT
100 Views
3GPP-5G, AI Processor, CAN-FD, Embedded Security Modules, Ethernet, FlexRay, Safe Ethernet
View Details Datasheet

Integrated Diagnostics & Aftersales Transformation (iDART)

KPIT provides state-of-the-art solutions for vehicle diagnostics and aftersales service, essential for the maintenance of software-intensive vehicles. The iDART framework offers comprehensive diagnostic functions and enhances service operations through AI-guided systems. This framework facilitates the transition to a unified, future-proof diagnostic ecosystem, reducing downtime and ensuring optimal vehicle performance. KPIT's solutions streamline complex diagnostic processes, making vehicles easier to manage and repair over their lifespans, enhancing customer satisfaction and loyalty.

KPIT
89 Views
Cryptography Cores, Embedded Security Modules, Flash Controller, MIL-STD-1553, Mobile SDR Controller, Processor Core Independent, Receiver/Transmitter
View Details Datasheet

AHB-Lite APB4 Bridge

The AHB-Lite APB4 Bridge facilitates connectivity between different bus protocols, specifically the AMBA 3 AHB-Lite and AMBA APB v2.0. As a soft IP, it is parameterized, making it adaptable to various design specifications. This bridge is crucial in systems requiring efficient data transport between high-speed and low-power subsystems, providing a seamless communication interface.

Roa Logic BV
82 Views
AMBA AHB / APB/ AXI, Embedded Security Modules, Interlaken
View Details Datasheet

PUFrt

PUFrt is a foundational security solution that equips semiconductors with hardware root key generation and storage, essential for establishing a Hardware Root of Trust. It introduces a 1024-bit PUF-based identification code and a true random number generator (TRNG) that comply with stringent cryptographic standards, enhancing data protection against diverse threats. The design includes secure OTP storage and an anti-tamper shell, providing a robust defense against physical attacks. Assured compatibility with varied architectures allows PUFrt to integrate seamlessly, offering key provisioning and securing critical data across system platforms.

PUFsecurity
71 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

AHB-Lite Multilayer Switch

The AHB-Lite Multilayer Switch is engineered to provide a high-performance, low-latency interconnect fabric capable of supporting numerous bus masters and slaves. This switch is essential in complex system architectures where multiple data paths need to be managed efficiently simultaneously, ensuring seamless data throughput and reduced bottlenecks in system operations.

Roa Logic BV
69 Views
AMBA AHB / APB/ AXI, Embedded Security Modules
View Details Datasheet

Secure OTP

Secure OTP offers advanced anti-fuse memory protection, serving as a reliable safeguard for embedded non-volatile memory. Integrating Physical Macros and Digital RTL, it provides a robust solution for sensitive data storage such as keys and boot code. With a 1024-bit PUF, Secure OTP handles data scrambling and IO shuffling, ensuring high-security protection against physical threats. Its universality in integration across multiple ASIC applications makes it an integral component in securing data within IoT devices and extending its utility to diverse markets such as PCIe and Smart TVs.

PUFsecurity
67 Views
Cryptography Cores, Embedded Memories, Embedded Security Modules, Security Subsystems, SRAM Controller
View Details Datasheet

PUFcc

PUFcc is a crypto coprocessor that combines a Hardware Root of Trust with a comprehensive suite of cryptographic capabilities. It integrates seamlessly into various system architectures, providing a complete security protocol solution required for IoT and AI technologies. The PUFcc leverages its foundational PUFrt's secure design while enhancing cryptographic functionality with certified algorithms. This drop-in IP module features direct memory access, enabling faster data interaction necessary for real-time applications. Particularly with its latest iteration, the PUFcc7, improvements in algorithm performance and TLS1.3 compliance demonstrate its adaptability to evolving standards.

PUFsecurity
64 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Secure Protocol Engines

Secure-IC's Secure Protocol Engines provide high-performance IP blocks aimed at offloading network and security processing tasks. These engines are designed to efficiently accelerate cryptographic operations within both FPGA and ASIC environments. They allow for seamless integration into existing security architectures, facilitating enhanced data protection and processing speed, which are essential in modern high-performance computing scenarios.

Secure-IC
63 Views
AMBA AHB / APB/ AXI, CXL, Embedded Security Modules, Ethernet, I2C, IEEE1588, USB, V-by-One
View Details Datasheet

FortiCrypt

FortiCrypt is designed to provide AES protection against side-channel attacks (SCA) and fault injection attacks (FIA) without compromising on performance or latency. It utilizes sophisticated masking methods and has been rigorously tested using the Test Vector Leakage Assessment (TVLA) methodology. FortiCrypt supports various high-performance configurations, including ultra-high performance, ultra-low power, and a balanced approach that meets diverse security needs. These configurations allow for encryption of high-definition video streams on less powerful CPUs, making it ideal for a range of applications that require advanced security.

FortifyIQ
60 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

PQCryptoLib Embedded

Post-quantum cryptography library for memory-constrained platforms PQCryptoLib-Embedded is a version of PQCryptoLib, PQShield’s library of post-quantum cryptographic algorithms, which is designed for microcontrollers or memory-constrained platforms. The library is highly configurable at build time, which means binary size and memory footprint can be minimized, making this product ideal for constrained devices. Efficiency is important in implementing ML-DSA and ML-KEM, especially for devices or networks requiring quantum-safe TLS communication such as in IoT environment. As a standard software library, PQCryptoLib-Embedded is a versatile tool for developing post-quantum protocols in memory-constrained situations.

PQShield
60 Views
Cryptography Software Library, Embedded Security Modules
View Details Datasheet

PSA Compliant Crypto API

The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.

Tiempo Secure
60 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details Datasheet

PLIC

The PLIC (Platform-Level Interrupt Controller) is a fully compliant RISC-V IP designed to manage multiple interrupt sources within a system. This feature-rich controller is configurable, allowing it to be tailored to specific system requirements while maintaining compliance with RISC-V architectural standards. Its flexibility and capability to prioritize interrupt handling ensure efficient processing, which is crucial for high-performance computing environments.

Roa Logic BV
59 Views
Arbiter, Embedded Security Modules, IEEE1588, Interrupt Controller, Platform Security
View Details Datasheet

Polar Encoders/Decoders

Polar Encoders/Decoders from Creonic are designed with the latest communication standards in mind, delivering exceptional performance in error correction through polar coding techniques. Originally developed for 5G systems, polar coding offers strong error correction capabilities with high efficiency, making these cores critical for next-generation communication systems. These encoders/decoders provide a consistent performance boost by efficiently utilizing channel capacity, which is particularly beneficial in high-throughput scenarios such as wireless backhaul and cellular networks. Creonic’s implementation focuses on minimizing complexity while maximizing speed, ensuring the cores can handle demanding communication tasks without excessive processing overhead. The Polar Encoders/Decoders IP cores are packed with a rich set of features that include adjustable code rates and length, providing adaptability to various requirements. With comprehensive support for both FPGA and ASIC deployments, they offer a robust, flexible solution for those looking to enhance their existing digital communication frameworks.

Creonic GmbH
59 Views
3GPP-5G, A/D Converter, Cryptography Cores, DVB, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

Turbo Encoders/Decoders

Turbo Encoders/Decoders by Creonic represent key components for achieving effective forward error correction in communication systems. Utilizing turbo coding, these IP cores enhance data throughput by rapidly encoding and decoding signals, ensuring minimal error propagation and optimal data integrity. Widely used in standards like DVB-RCS2 and LTE, Turbo coding provides excellent performance gains in error correction. These cores are specifically designed to handle large volumes of data with high efficiency, allowing technologies like 4G and upcoming 5G networks to deliver their promised speeds reliably. Creonic’s Turbo Encoders/Decoders support a range of code rates, making them adaptable for various transmission conditions and enabling dynamic applications across different communication landscapes. Importantly, they incorporate advanced algorithmic techniques to accelerate processing speeds and reduce latency – essential qualities for real-time applications. Supported with a suite of testing environments and simulation models, these IP cores ensure straightforward integration into user hardware, providing considerable flexibility for both FPGA and ASIC implementation scenarios.

Creonic GmbH
59 Views
3GPP-5G, A/D Converter, Cryptography Cores, DVB, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

ATEK367P4 (Phase Shifter)

The ATEK367P4 functions as a versatile phase shifter component designed for RF systems working between 2 GHz to 4 GHz. This analog phase shifter provides an extensive phase range adjustable from 0 to 375 degrees, maximizing flexibility in phase alignment applications. It has a low insertion loss of 3 dB, ensuring minimal signal degradation during the shifting process. Encased in a 4×4 mm QFN package, it provides a compact footprint, enhancing its usability in space-constrained designs such as phased array antennas and electronic warfare systems. The phase shifter operates with variable control voltage, offering ease of integration with existing signal processing frameworks. ATEK367P4 is integral for applications demanding precise phase adjustments, notably in aerospace and defense communication systems where accuracy and agility are imperative. Its design facilitates seamless integration, ensuring reliability and performance consistency in complex signal processing tasks.

Atek Midas
56 Views
TSMC
28nm
AMBA AHB / APB/ AXI, Analog Front Ends, Embedded Security Modules, GPU
View Details Datasheet

LDPC Encoders/Decoders

Creonic's LDPC Encoders/Decoders are designed to provide high-efficiency error correction for modern communication systems. These IP cores follow advanced LDPC (Low-Density Parity-Check) coding schemes to offer a balance of performance and flexibility. They are suitable for use in a plethora of standards such as DVB-S2, DVB-S2X, 5G, and CCSDS, ensuring robust data transmission across various signal conditions. The LDPC solutions by Creonic are known for their high throughput, making them fit for applications that demand speed and accuracy. Their capability to process and correct errors efficiently ensures data integrity, especially in bandwidth-critical systems. Users can expect comprehensive integration support with available design kits and simulation models that aid seamless incorporation within existing hardware platforms. With flexibility for both FPGA and ASIC implementations, Creonic's LDPC encoders and decoders come equipped with adaptive features that allow for various code rates and block lengths. This adaptability ensures that users can tailor the application to meet specific requirements, benefiting from the cores' proven reliability in delivering high-quality data communication.

Creonic GmbH
56 Views
3GPP-5G, A/D Converter, ATM / Utopia, Bluetooth, Cryptography Cores, DVB, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

PQPerform Lattice

Post-Quantum Cryptography Processing Engine Adds support for lattice-based cryptographic operations such as ML-KEM and ML-DSA. PQPlatform-Lattice provides post-quantum support for these NIST-standardized algorithms with minimal area, and leverages an existing SHA-3 accelerator, powered by PQShield-supplied firmware. It’s designed for minimal area, and maximum compatibility, and is deployed with optional firmware-backed side-channel resistance.

PQShield
56 Views
GLOBALFOUNDARIES
12nm
Cryptography Cores, Embedded Security Modules
View Details Datasheet

eSi-Crypto

The eSi-Crypto suite from EnSilica offers an extensive range of cryptographic IPs designed to provide high-quality encryption and authentication functionalities. A standout feature of this suite is its True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and ensures robust random number generation essential for secure communication. These cryptographic cores are versatile and can be easily integrated through various bus interfaces like AMBA APB/AHB and AXI.\n\nSupporting numerous algorithms such as CRYSTALS Kyber and Dilithium, ECDSA/ECC, and AES, the eSi-Crypto suite advances quantum-resilient cryptography. This feature is crucial as it prepares secure digital communications against future quantum threats. Moreover, the suite includes high-throughput solutions suitable for applications that demand both efficiency and resource optimization, like V2X communications.\n\nEnSilica's cryptographic IPs exhibit compatibility with ASIC and FPGA targets, offering low resource usage while maintaining exceptionally high throughput. The suite also encloses IPs for various SHA algorithms, ChaCha20, Poly1305, and traditional standards like RSA and TDES. This comprehensive range meeting both modern cryptographic demands ensures that data protection remains robust and flexible in diverse application scenarios.

EnSilica
54 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details Datasheet

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module, or PHSM, by CrossBar, is designed to address the growing need for enhanced security measures in electronic devices. By leveraging CrossBar's ReRAM technology, the PHSM offers a robust solution for secure key storage and encryption, protecting devices from unauthorized access and cyber threats. It acts as a vital component in maintaining the integrity and confidentiality of data across various applications. The module incorporates cryptographic mechanisms to create a secure environment against physical and digital attacks, ensuring that sensitive information remains protected from sophisticated hacking attempts. The intrinsic characteristics of ReRAM technology, such as its high randomness and low bit error rates, form the core of the PHSM's ability to deter potential attacks. Engineered with a focus on root of trust applications, the PHSM reinforces secure authentication processes, which are crucial in industries like automotive, medical, and IoT-based systems. The compact design aids in seamless integration within semiconductor hardware, thereby supporting diverse applications that demand rigorous security protocols.

CrossBar Inc.
53 Views
All Foundries
28nm, 90nm, 500nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, is a robust lifecycle management solution tailored for secure deployment, supply, and management of embedded devices. This platform facilitates zero-touch security lifecycle services such as provisioning, firmware updates, and security monitoring, thus ensuring consistent and reliable security from chip manufacture to device decommissioning. It integrates both a secure element (iSE) and a server component, creating a comprehensive chip-to-cloud security solution capable of functioning on public and private cloud environments.

Secure-IC
52 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Dukosi Cell Monitoring System (DKCMS)

The Dukosi Cell Monitoring System (DKCMS) is an advanced solution designed to enhance the performance, safety, and sustainability of batteries, particularly for high-power applications. This innovative system employs a Dukosi DK8102 Cell Monitor per cell, offering precise voltage and temperature data collection. By using the proprietary C-SynQ communication protocol, cell data is transmitted synchronously via a single bus antenna to a DK8202 System Hub, maintaining communication even amid dynamic conditions. This architecture facilitates real-time monitoring, ensuring cells operate within safe parameters while optimizing the battery's overall performance. DKCMS's contactless connectivity stands out, eliminating the complexity of traditional wire harnesses and simplifying integration. This design reduces the number of components needed, which underscores reliability and reduces cost. Additionally, the contactless communication provides robust data transmission with predictable latency, catering to complex, safety-critical environments where precision and reliability are paramount. Scalability is another essential feature of the DKCMS, enabling seamless adaptation to a range of applications from electric vehicles to energy storage systems. The system supports up to 216 cells, allowing flexibility in design without extensive reengineering. This allows for efficient upscaling or downscaling according to specific project requirements, ensuring that the solution can evolve alongside changing technological or market landscapes.

Dukosi
51 Views
8 Categories
View Details Datasheet

Flash Protection Series

The Flash Protection Series extends hardware security by safeguarding both embedded and external flash memory, making it essential for maintaining data integrity in System on Chip (SoC) environments. This series includes PUFef, designed for embedded flash, which incorporates a Hardware Root of Trust with a lightweight crypto engine, and PUFenc for external NAND flash memory, which secures stored assets by employing local keys for encryption. Furthermore, PUFxip focuses on NOR flash, offering real-time decryption for execution-in-place efficiency. These solutions facilitate maintaining a secure boundary, thus preventing unauthorized access and upholding the confidentiality of valuable SoC data.

PUFsecurity
50 Views
Embedded Memories, Embedded Security Modules, Flash Controller, NAND Flash
View Details Datasheet

AES Encryption for RFID applications

The AES Encryption for RFID applications is engineered to provide robust security for data in RFID communications. Utilizing Advanced Encryption Standard (AES) techniques, it offers a secure and efficient mechanism for protecting sensitive information transmitted in RFID systems. This encryption solution is ideal for applications where data integrity and confidentiality are paramount, protecting against unauthorized access and ensuring secure wireless transactions.

RADLogic Pty Ltd
48 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details Datasheet

PQPlatform SubSys

Post-Quantum Security Subsystem A cryptographic subsystem, designed to provide cryptographic services. These services include post-quantum signature generation, verification, and secure key establishment. PQPlatform-SubSys uses its built-in CPU independently from the surrounding system, allowing cryptographic services to be offloaded efficiently from the system processor.

PQShield
47 Views
Samsung
12nm
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Quantum Resistant Encryption Core

The Quantum Resistant Encryption Core by Crypto Quantique is engineered to provide unparalleled security for IoT devices through its integration of quantum technology. This core is designed to defend against the potential future threats posed by quantum computers, ensuring long-term data security. It utilizes advanced quantum algorithms that offer higher levels of encryption compared to traditional methods, making it highly resilient to attempts at unauthorized access. A major advantage of this encryption core lies in its capacity to offer both future-proof and adaptable security protocols. These features are essential for modern IoT devices, which require not only resistant infrastructures to potential quantum-level risks but also flexibility in deployment across various platforms and devices. Its design ensures that it can be embedded into a wide variety of IoT ecosystems, providing security that is scalable and responsive to an evolving threat landscape. Furthermore, this core is distinguished by its ability to seamlessly integrate with existing hardware setups. Crypto Quantique ensures that their encryption core is compatible with numerous process nodes and foundries, thereby offering broad support for different manufacturing requirements and enhancing the security framework of any digital platform. Its robust design and high compatibility make it a valuable asset for any organization aiming to protect sensitive information sustainably and effectively.

Crypto Quantique
47 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

PQPlatform Lattice

Post-Quantum Cryptography Processing Engine Adds support for lattice-based cryptographic operations such as ML-KEM and ML-DSA. PQPlatform-Lattice provides post-quantum support for these NIST-standardized algorithms with minimal area, and leverages an existing SHA-3 accelerator, powered by PQShield-supplied firmware. It’s designed for minimal area, and maximum compatibility, and is deployed with optional firmware-backed side-channel resistance.

PQShield
46 Views
GLOBALFOUNDARIES
12nm
Cryptography Cores, Embedded Security Modules
View Details Datasheet

DAES Cryptographic Processor

The DAES processor serves as a robust cryptographic co-processor designed to support the Rijndael algorithm, which is crucial for advanced encryption standards. Capable of handling 128-bit and 256-bit key lengths, this unit provides robust security measures for various cipher block modes such as ECB, CBC, CFB, OFB, and CTR. Integrated with internal key expansion modules, the DAES ensures efficient cryptographic operations while maintaining secure key management. Its architecture supports integration with APB, AHB, and AXI buses, which simplifies its deployment across diverse silicon environments and enhances its applicability in systems necessitating high levels of security. This cryptographic unit is ideal for applications in secure communications, defense, and areas requiring data confidentiality and integrity. The DAES's tailored encryption capabilities make it a formidable choice for developers seeking to bolster system security and manage complex data encryption processes.

DCD-SEMI
44 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

MGNSS IP Core for GNSS Integration

The MGNSS IP offers a comprehensive multi-frequency and multi-constellation GNSS baseband core that supports integration into automotive, smartphone, precision and IoT application systems. It is designed to manage legacy and modernized GNSS signals across various constellations, seamlessly adapting to application needs. This IP emphasizes energy efficiency and swift acquisition alongside precise tracking capabilities. Featuring 64 parallel GNSS signal tracking channels, it stands capable of fast acquisition and precise measurement outputs. It supports dual-frequency operations through two RF channels and employs advanced interference management techniques. This configuration enables the IP to operate effectively amidst both intentional and unintentional signal disturbances, providing robust navigation solutions. This core is notable for its comprehensive support across L1, L2, L5, and S band frequencies, making it adaptable for use with GPS, Galileo, GLONASS, BeiDou, QZSS, IRNSS, and SBAS systems. Focusing on power conservation, it allows for various power-down modes adjusting to application demands.

Accord Software and Systems Pvt Ltd
43 Views
GLOBALFOUNDARIES
7nm LPP, 28nm, 65nm
AI Processor, AMBA AHB / APB/ AXI, Embedded Security Modules, GPS, Interrupt Controller, MIPI, PCI, USB, W-CDMA
View Details Datasheet

PQPlatform CoPro

Post-Quantum Cryptography Processor PQPlatform-CoPro (PQP-HW-COP) adds PQShield’s state-of-the-art post-quantum cryptography (PQC) to your security sub-system, with optional side-channel countermeasures (SCA). PQPlatform-CoPro can be optimized for minimum area as part of an existing security sub-system. PQPlatform-CoPro is designed to be run by an existing CPU in your security system, using PQShield’s supplied firmware.

PQShield
43 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

iShield Key

The iShield Key is an advanced hardware authentication tool designed to protect digital identities with the utmost security. Combining the robustness of FIDO security standards with MIFARE DESFire EV3 technology, the iShield Key offers unparalleled access control and authentication capabilities. It is crafted to meet the diverse needs of modern user authentication applications that extend beyond traditional methods. Designed for flexibility, the iShield Key provides users with enhanced security options, safeguarding against online threats such as phishing and account takeovers. Its hardware-based protection ensures that sensitive information, such as passwords and private keys, remain secure from tampering and unauthorized access. Perfect for both personal and enterprise use, the iShield Key seamlessly integrates with existing systems, offering a plug-and-play solution for enhanced cybersecurity. Its user-friendly design ensures that security measures can be implemented efficiently without the need for extensive technical knowledge, making it a valuable tool in the digital security arsenal.

Swissbit AG
42 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

NVM Defender

NVM Defender is a comprehensive solution designed to fortify non-volatile memory structures against potential security breaches. With its advanced protection features, NVM Defender provides a robust countermeasure against unauthorized access, ensuring data integrity and confidentiality. The solution is tailored to address the intricate security challenges that arise in various types of memory circuits, safeguarding them from both invasive and non-invasive attacks. Its implementation is crucial for applications demanding high-security standards, such as finance and personal data protection.

Texplained
42 Views
Embedded Security Modules, NVM Express, Platform Security, Security Subsystems
View Details Datasheet

ReRAM Secure Keys

ReRAM Secure Keys by CrossBar provide a cutting-edge solution for applications requiring a robust security framework. This technology leverages the unique characteristics of ReRAM technology to generate cryptographic keys that serve as the foundation for secure device operations. These keys function as Digital Fingerprints, crucial in preventing unauthorized access and copying. ReRAM Secure Keys technology surpasses traditional SRAM-based security solutions, offering high randomness, low error rates, and strong resistance to tampering. It is particularly well-suited for devices in IoT, computing, and infrastructure where security threats are prevalent and systems require stringent protective measures. This solution enhances device root of trust, a vital component for authentication and encryption processes. Its ability to securely maintain cryptographic keys even in foundry nodes smaller than 28nm underscores its versatility and strength in the industry's pursuit of high-security standards across various electronic applications.

CrossBar Inc.
42 Views
All Foundries
28nm, 90nm, 250nm
Cryptography Cores, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

DOME for Building Automation Systems

DOME for Building Automation Systems is a comprehensive platform designed to provide cybersecurity solutions for automation control devices in building systems. It offers a Zero Trust framework, enabling real-time endpoint protection against sophisticated cyber threats. The system is built to be easily deployable without the need for extensive IT skills or network segmentation, offering a seamless integration into legacy and new systems alike. By focusing on secure communications and device-level protection, DOME ensures that building operations remain secure and uninterrupted.

Veridify Security Inc.
39 Views
AMBA AHB / APB/ AXI, Embedded Security Modules, Platform Security, Security Subsystems, USB
View Details Datasheet

CXL Controller

Designed to deliver high-speed, low-latency communication between processors and various accelerators, the CXL Controller stands out with its superior performance metrics. Crafted to meet the demands of modern data centers, this controller minimizes latency, thereby improving throughput across AI and computing tasks. By leveraging Compute Express Link technology, it facilitates efficient memory expansion and device connectivity, supporting vast arrays of servers and computational devices. The CXL Controller ensures that data coherence across interconnected systems is maintained, which is pivotal for resource-intensive applications like AI and cloud-based computing. The controller's architecture supports various devices, from subsystems to accelerators, resulting in more flexible and dynamic resource usage that boosts overall system efficiency. One of the key features of this CXL Controller is its integration capacity across a wide range of devices. This adaptability enables it to unify computing operations, delivering substantial improvements in operational cost and efficiency. In particular, its application in AI environments underscores its capacity to reduce data traffic and streamline performance, ultimately facilitating more robust and expansive computing environments.

Panmnesia
38 Views
GLOBALFOUNDARIES, TSMC, UMC
10nm, 16nm, 28nm
AMBA AHB / APB/ AXI, Embedded Security Modules, Gen-Z, IEEE1588, PCI, RapidIO, SAS, SATA, SDRAM Controller, USB, VESA
View Details Datasheet

DSHA2-256 Cryptography Co-Processor

The DSHA2-256 is a highly efficient cryptographic co-processor, serving as a pivotal solution for hash operations in secure communications. It is designed to accelerate the SHA2-256 hash functions, adhering to the FIPS PUB 180-4 standards. This processing unit supports both SHA2 224 and 256 bit modes, providing significant flexibility for developers working with varying levels of security requirements. This co-processor also supports HMAC in its native mode as per RFC 2104 recommendations, thus broadening its applicability in secure message authentication. The DSHA2-256 stands as a versatile tool for enhancing data integrity and verification in multiple domains such as fintech, defense, and wireless communications. With seamless integration capabilities, the DSHA2-256 fits well with APB, AHB, and AXI bus systems. This ensures it can be easily incorporated into existing processing environments without significant overhead, thereby streamlining the development process while safeguarding data against potential threats.

DCD-SEMI
38 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

iShield HSM

Swissbit's iShield HSM is specifically engineered to enhance security in IoT deployments by securely storing critical authentication keys. As a trusted secure element, it provides a robust solution to protect against unauthorized access and duplication of sensitive data. This hardware security module is designed for seamless integration with AWS IoT Greengrass devices, enhancing the security infrastructure of existing systems with ease. The iShield HSM functions as a security anchor, securely safeguarding private keys and certificates, ensuring they are not exposed to potential vulnerabilities that software might encounter. Its plug-and-play nature allows for straightforward retrofitting into existing devices, making it an efficient choice for systems requiring heightened security over the memory bus. Particularly suited for industrial and embedded applications, the iShield HSM supports a wide range of uses, from securing system log files to protecting data streams in machine-to-machine communications. Its comprehensive encryption and access protection capabilities make it an ideal choice for organizations prioritizing data integrity and security.

Swissbit AG
38 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed to enhance the performance of cryptographic hashing functions. It efficiently balances area and throughput, complying with NIST's FIPS 202 standard. Supporting various SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, it offers extendable output functions like SHAKE-128 and SHAKE-256. Emphasizing security, it provides robust protection against time-based side channel attacks and includes automatic byte padding for streamlined operation. Crafted with simplicity in mind, this IP core integrates seamlessly into a single clock domain environment, showcasing rigorous verification to ensure reliability. Its applications are extensive, catering to needs for data integrity checks and authentication across multiple sectors. With a focus on adaptability, it serves roles in Message Authentication Codes, IPsec and TLS/SSL protocols, secure boot engines, encrypted data storage, and more. Its adaptability extends into e-commerce, financial transaction systems, blockchain technology, and pseudo-random bit generation, making it a versatile choice for projects requiring robust security features. The SHA-3 Crypto Engine positions itself as a critical component in secure data management solutions for modern technology landscapes.

KiviCore
38 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

WiseEye2 AI Solution

The WiseEye2 AI Solution is a transformative component in the realm of battery-operated AI applications, merging ultra-low power CMOS image technology with high-performing microcontrollers. This solution facilitates continuous operation while maintaining remarkably low power consumption, essential for maximized battery life in smart devices. Built on ARM's Cortex M55 CPU and Ethos U55 NPU, the WiseEye2 brings enhanced computational power, ensuring faster and more accurate AI inference without significant energy trade-offs. Its architecture leverages sophisticated power management techniques and security functions to deliver seamless and secure AIoT experiences. Facilitating advancements in smart home, security, and consumer electronics, WiseEye2's AI capabilities are crucial for user presence detection, facial recognition, and automated control applications. This innovation continues to support next-gen AI solutions, essential for future digital and connected environments.

Himax Technologies, Inc.
38 Views
AI Processor, Audio Processor, Embedded Security Modules, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet

Keccak Hash Engine

The Keccak Hash Engine stands out for its versatility and function beyond traditional hashing. Renowned primarily for cryptography, it encompasses authentication, encryption, and pseudo-random number generation. At its core lies the Keccak-f cryptographic permutation, employing sponge construction for adaptability and configurability. Keccak's flexibility allows customization for varied hash outputs and security levels, adhering to standards like 3GPP TS 35.231 and NIST's FIPS 202. Thoroughly analyzed and publicly scrutinized, this engine is an epitome of secure and reliable cryptographic functions. Designed with ease of integration and extensive verification, it fits seamlessly into restrictive environments. It can be tailored for unique outputs, ensuring it meets the specific demands of diverse applications, from blockchain to secure communications.

KiviCore
37 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Thermal Noise-based Random Bit Generator

This thermal noise-based random bit generator leverages the inherent unpredictability of thermal noise to create truly random sequences of bits, vital for security protocols and cryptographic applications. Operating within a frequency range of 0.2 to 2 MHz, the generator is engineered for efficient power use with a quiescent current draw of around 50 uA. The compact design and reliable output make it suitable for applications where secure random bit generation is a necessity, such as in secure communications and data encryption systems.

VivEng, Inc.
36 Views
TSMC
90nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details Datasheet

AES IP Core

The AES IP Core by IP Cores, Inc. offers a sophisticated implementation of the Advanced Encryption Standard (AES) suitable for environments requiring secure data encryption and decryption. This ultra-compact core is compliant with NIST's AES standard and is suitable for applications needing high security. It processes 128-bit or 256-bit data blocks and supports various encryption modes such as ECB, CBC, CFB, OFB, and CTR, making it versatile for different cryptographic needs. Designed for both ASIC and FPGA platforms, this IP core is fully synchronous and available in source and netlist form for ease of integration. Notably, the core offers features like key expansion and supports data integrity protection and differential power analysis resistance, enhancing its security robustness. For efficient operation, it is available in various configurations with optional features like data masking to protect against side-channel attacks. The core is designed to support high throughput performance and is synthesized to achieve clock speeds exceeding 800 MHz, delivering up to 10 Gbps data throughput. This makes it an apt choice for applications in high-speed communication networks, secure data storage, and digital rights management systems.

IP Cores, Inc
35 Views
GLOBALFOUNDARIES, Intel Foundry, Samsung, TSMC, UMC, VIS
4nm, 7nm LPP, 7nm, 22nm, 90nm, 150nm
AI Processor, Cryptography Cores, Embedded Security Modules
View Details Datasheet

DKCMS Core

The DKCMS Core integrates seamlessly into high-performance battery packs, offering a robust and innovative cell monitoring solution. This core functionality supports precise, per-cell measurements and robust data processing, which are transmitted to the main BMS via the System Hub using Dukosi's unique C-SynQ protocol. The core is designed to maintain synchronization and accurateness even in rapidly changing environments, bolstering the security and reliability of the battery management system. This core system is tailored specifically for high-capacity battery applications, providing solutions that augment the overall safety, efficiency, and life span of battery packs. With its adaptive channel hopping and automatic or manual channel masking features, the DKCMS Core ensures uninterrupted and secure data communication. Additionally, its wake-on-fault feature is essential for systems that need to maintain vigilance even during low power conditions. Notably, the core's scalability feature allows it to manage substantial battery capacities, making it suitable for everything from vehicles to stationary storage solutions. The design also incorporates elements like passive cell balancing and fault reporting which contribute toward improved operational efficacy and longevity, resulting in lower operational costs and increased robustness of the battery systems in which it is implemented.

Dukosi
35 Views
Cryptography Software Library, Embedded Security Modules, Input/Output Controller, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators, Timer/Watchdog
View Details Datasheet

Side-channel Attack Resistance

This solution offers unparalleled defense against side-channel attacks by leveraging simulation and analysis technology during the design phase. This enables developers to identify and address vulnerabilities before fabrication, significantly reducing costs and improving security assurance. The technology can simulate classic correlational attacks, template attacks, and other innovative strategies, providing comprehensive protection tailored to the distinct requirements of modern hardware designs.

FortifyIQ
35 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

Wireless energy transfer with interference enhancement

This technology from WiTricity focuses on enhancing wireless energy transfer by managing interference. By leveraging advanced algorithms and resonant magnetic systems, it ensures efficient power delivery even in environments where interference might be an issue. The system is adept at quantifying and minimizing potential disruptions, thus providing a stable power transfer solution ideal for sensitive applications. Enhancements in interference management ensure that the energy transfer remains robust and consistent, which is crucial for complex environments such as urban settings where multiple wireless signals coexist. The technology caters to high-demand applications, providing reliable energy transfer for devices like EVs, which require consistent power flow. This approach not only amplifies the effectiveness of energy transfer but also encapsulates safety and control mechanisms that prevent overheating and overloading, thereby extending the operational lifespan of devices. WiTricity's interference enhancement ensures that wireless power systems can operate unimpeded, maintaining performance irrespective of competing signals.

WiTricity
35 Views
All Foundries
55nm
A/D Converter, Embedded Security Modules, Photonics
View Details Datasheet

DOME for Industrial Automation

Designed for the industrial sector, DOME for Industrial Automation provides robust cybersecurity measures to protect operational technology and control systems from cyber threats. Its zero-touch onboarding and management capabilities make it ideal for devices with limited resources, ensuring secure authentication and data integrity. The solution targets endpoint protection for Industrial Control Systems (ICS) which are critical in protecting industrial facilities against potential cyber incidents. DOME's compatibility with existing systems allows for efficient integration and long-term security maintenance.

Veridify Security Inc.
33 Views
AMBA AHB / APB/ AXI, Embedded Security Modules, Platform Security, Security Subsystems, USB
View Details Datasheet

AES Key Wrap Core

The AES Key Wrap Core from IP Cores, Inc. implements the NIST standard AES key wrapping and unwrapping functionalities, ensuring secure key management in digital systems. This core is engineered to support both 128-bit and 256-bit Key Encryption Keys (KEK), permitting secure key exchange and storage practices compliant with AES key management standards. Compactly designed, the AKW1 core utilizes under 8,000 ASIC gates, making it ideal for integration into embedded systems where space is at a premium. The core does not require any external memory resources, adding to its adaptability and ease of incorporation into various hardware environments. Available as both source and netlist, the core also includes the AES key expansion function, supporting flow-through operations with both encryption (wrap) and decryption (unwrap) capabilities. Primarily, this core is suitable for applications requiring secure key wrapping according to the RFC 3394 specification and can be a critical component in systems handling sensitive key data across secure communications and data storage platforms. Its efficient design ensures high throughput, maintaining secure key processing without delay, and is tested with NIST-compliant test vectors to ensure fidelity and security compliance.

IP Cores, Inc
30 Views
GLOBALFOUNDARIES, Samsung, TSMC, UMC
28nm, 90nm, 150nm
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures focus on pinpointing and remedying design-level vulnerabilities susceptible to fault injections. By using advanced simulation tools, the system allows for early detection of potential weaknesses, offering a flexible and precise pre-silicon analysis. This reduces the risk of costly post-production fixes and ensures that the hardware remains secure against targeted disruptions, making it a vital component in maintaining robust device security protocols.

FortifyIQ
27 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

HDCP 1.x/2.x

The HDCP 1.x/2.x solutions by Bitec offer a reliable encryption method, essential for the protection and secure transfer of digital content across HDMI and DisplayPort interfaces. The core is engineered to provide robust defense against unauthorized access, maintaining the integrity and confidentiality of transmitted media. This is crucial for applications ranging from broadcast media to gaming consoles, where content protection is paramount.\n\nBitec's HDCP solution plays a vital role in preventing the illegal copying and distribution of media, supporting both HDCP 1.x and 2.x protocols. This dual-compliance ensures compatibility with a wide range of devices, creating seamless interconnectivity between older and newer hardware systems. By safeguarding digital signal transmission, companies can ensure they meet compliance regulations while delivering quality content.\n\nThis technology not only meets existing standards but is designed to adapt to future security advancements. It integrates easily into high-definition video solutions, addressing the evolving requirements of the media industry for versatile and effective content protection mechanisms.

Bitec
26 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

CCSDS LDPC (8160, 7136)

IPrium's CCSDS LDPC (8160, 7136) implements a Low-Density Parity-Check (LDPC) encoding and decoding scheme as per the Consulting Committee for Space Data Systems (CCSDS) standards. This IP core is crafted to optimize data transmission in satellite and space communication systems where signal integrity and error correction are vital. This LDPC solution is tailored for highly efficient data correction processes, minimizing the adverse effects of noise and distortion in signal propagation. Its architecture supports extensive fault tolerance, a crucial requirement for maintaining long-duration communication links in space missions, thereby ensuring data remains uncorrupted over vast distances. Widely adopted in the aerospace industry, this LDPC standard adheres to stringent performance parameters, making it a trusted choice for state-of-the-art communications technology. By incorporating IPrium's CCSDS LDPC into your systems, you achieve superior error rate performance, vital for reliable and secure communications in challenging environments.

IPrium LLC
25 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Copy Protection

ALSE's Copy Protection IP provides a security solution tailored for protecting digital content and designs against unauthorized use or duplication. This IP utilizes robust cryptographic techniques to secure data paths and memory blocks within FPGA designs, preventing piracy and ensuring data integrity. By incorporating integrated security measures, the Copy Protection IP from ALSE is essential for industries needing to safeguard intellectual property and sensitive data, such as consumer electronics, entertainment, and secure communications. It is particularly significant in applications where unauthorized access and copying could lead to substantial losses or breaches. ALSE offers continuous support and updates, ensuring the IP remains effective against emerging security threats. Suitable for integration across multiple FPGA platforms, this Copy Protection IP provides a comprehensive solution for developers aiming to fortify their product designs against illicit duplication and tampering.

ALSE Advanced Logic Synthesis for Electronics
21 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules
View Details Datasheet
Chat to Volt about this page

Chatting with Volt