Find IP Sell IP Chip Talk About Us Contact Us
Log In

All IPs > Security IP > Platform Security

Platform Security Semiconductor IP Solutions

In today's digital world, the importance of platform security cannot be overstated. Platform security semiconductor IPs are essential for protecting electronic systems from an increasing array of threats. These IPs play a critical role in ensuring that systems remain secure by safeguarding data, communications, and applications from unauthorized access or malicious attacks.

Platform security IPs include a variety of solutions such as encryption engines, secure boot mechanisms, and trusted execution environments. These technologies work in harmony to validate the authenticity of hardware and software components, providing a comprehensive security framework for electronic devices. By integrating these security measures at a fundamental level, semiconductor IPs ensure that systems are resilient to tampering and meet stringent security standards.

The applications of platform security semiconductor IPs span across a multitude of industries. From consumer electronics like smartphones and smart home devices to critical infrastructure systems and automotive applications, robust security is imperative. These IPs are designed to address the security needs of both edge devices and cloud-based platforms, preserving the integrity and confidentiality of sensitive data as it is processed and transmitted.

In our Silicon Hub, you will find a diverse array of platform security semiconductor IPs tailored to meet varied security requirements. Whether you're looking to protect consumer devices or safeguard enterprise data centers, our cutting-edge IP solutions provide the reliability and flexibility needed to counteract evolving security threats. Explore our category to enhance your products with state-of-the-art security technologies.

All semiconductor IP
17
IPs available

Secure Enclave (Hardmacro)

Overview: The Secure Enclave IPs are Common Criteria (CC) EAL5+PP0084/PP0117 and EAL5+PP0117 certification-ready Secure Enclaves, respectively. They are available as hard macros for seamless integration into SoCs. These Secure Enclave IPs provide the highest level of security for an SoC, incorporating patented design techniques and countermeasures against side-channel and perturbation attacks to ensure robust security while minimizing power consumption. Key Features:  Cryptographic Hardware Accelerators: Efficiently support standard cryptography and security operations to increase throughput while adhering to power constraints and security requirements.  BootROM and Secondary Boot Loader: Manage the certified life cycle of the Secure Enclave, enforcing and assuring security from manufacturing to deployment.  Proprietary IP: Based on proprietary IP that is free of 3rd party rights and royalties. Benefits: The Secure Enclave IPs offer robust security measures, efficient cryptographic support, and secure life cycle management, making them ideal for applications that require the highest levels of security and reliability. Applications: The Secure Enclave IP is versatile and suitable for a wide range of applications, including but not limited to:  Secured and Certified iSIM & iUICC  EMVco Payment  Hardware Cryptocurrency Wallets  FIDO2 Web Authentication  V2X HSM Protocols  Smart Car Access  Secured Boot  Secure OTA Firmware Updates  Secure Debug  Any design requiring a Secure Enclave, Secure Element, or Hardware Root of Trust protected against side-channel and perturbation fault attacks. Compliance and Support: The Secure Enclave is compliant with and ready for CC EAL5+ and EMVCo certification. It is delivered with an SDK and pre-certified CryptoLibrary and secure Boot Loader for seamless integration and enhanced security.

Plurko Technologies
95 Views
All Foundries
All Process Nodes
Platform Security
View Details Datasheet

AUTOSAR & Adaptive AUTOSAR Solutions

KPIT Technologies is a forerunner in developing AUTOSAR-compliant platforms that support the evolution of software-defined vehicles. Their solutions facilitate efficient software integration, middleware development, and high-level application performance optimization. By using advanced tools and methodologies, KPIT helps speed up the production timelines of modern vehicles, ensuring compliance with both AUTOSAR Classic and Adaptive frameworks. Their technologies enable automakers to minimize platform validation times and reduce integration complexities, thereby enhancing the scalability and functionality of vehicle systems.

KPIT Technologies
77 Views
I2C, IEEE1588, Interlaken, PCI, Platform Security, USB
View Details Datasheet

PUFrt

PUFrt is a hardware-based root of trust solution that integrates seamlessly into a variety of semiconductor environments. It features a comprehensive security foundation with a 1024-bit Physical Unclonable Function (PUF) and a true random number generator compliant with NIST SP800-90B/SP-800-22 standards. This solution provides a robust platform for key generation and storage, ensuring sensitive data never leaves the chip. With built-in anti-tamper design and an 8k-bit secure storage space, PUFrt is capable of safeguarding vital data against physical attacks. Designed for flexibility, it supports multiple cryptographic operations and integrates easily into various architectures, providing a fortified base for semiconductor security, vital for applications such as secure boot and trusted execution environments.

PUFsecurity
53 Views
TSMC
28nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

Spec-TRACER

Spec-TRACER is a powerful tool for managing the lifecycle of FPGA and ASIC requirements. It provides a unified platform for capturing, managing, and tracing requirements, making complex designs more manageable and traceable throughout their lifecycle. This tool is specifically tailored to comply with stringent industry standards for user and design requirements, aligning with hardware and software deliverables. By facilitating clear requirement management, Spec-TRACER ensures thorough traceability and accountability, reducing risks of design deviations and enhancing communication across development teams. This results in a streamlined workflow where requirements can be easily documented, tracked, and matched with design outputs effectively. Spec-TRACER excels in capturing detailed analyzes and facilitating robust reporting, aligning closely with processes required in domains such as aerospace and defense. Its capacity to support comprehensive requirements management protocols makes it indispensable for projects demanding high levels of compliance and verification rigor, ultimately enhancing the quality and reliability of final products.

Aldec, Inc.
40 Views
AMBA AHB / APB/ AXI, CPU, Platform Security, Processor Cores
View Details Datasheet

eSi-Crypto

eSi-Crypto offers a robust suite of encryption and authentication solutions designed for ASIC and FPGA implementations. Characterized by low resource usage and high throughput, this cryptographic IP includes True Random Number Generators (TRNGs) that are compliant with NIST standards and can be integrated as a hard macro in the target technology. The IP supports several algorithms, such as CRYSTALS Kyber, CRYSTALS Dilithium for post-quantum cryptography, and widely used standards like RSA and AES, facilitating secure communication across diverse applications. It is compatible with AMBA APB/AHB as well as AXI bus interfaces, making it a versatile choice for sophisticated security needs.

EnSilica
30 Views
Content Protection Software, Cryptography Cores, Platform Security, Security Protocol Accelerators, USB
View Details Datasheet

Securyzr Key Management System

The Securyzr Key Management System provides robust, secure key management services across embedded systems. It ensures secure boot, efficient key isolation, and anti-tampering measures, enhancing the trustworthiness of critical systems. Its design ensures data integrity and confidentiality, making it a core component for any secure system architecture. This comprehensive IP solution integrates with existing frameworks to support seamless security management.

Secure-IC
30 Views
All Foundries
All Process Nodes
Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators
View Details Datasheet

Aeonic Integrated Droop Response System

The Aeonic Integrated Droop Response System is designed to enhance droop and DVFS response for integrated circuits. It includes multi-threshold droop detection and fast adaptation times, ensuring power savings and optimal system performance. This technology provides extensive observability and integrates standard interfaces like APB & JTAG, aiding silicon health management by delivering data-driven insights for lifecycle analytics.

Movellus
29 Views
Analog Subsystems, Clock Synthesizer, DC-DC Converter, Platform Security, SDRAM Controller
View Details Datasheet

AES Encryption for RFID applications

The AES Encryption for RFID applications is engineered to provide robust security for data in RFID communications. Utilizing Advanced Encryption Standard (AES) techniques, it offers a secure and efficient mechanism for protecting sensitive information transmitted in RFID systems. This encryption solution is ideal for applications where data integrity and confidentiality are paramount, protecting against unauthorized access and ensuring secure wireless transactions.

RADLogic Pty Ltd
28 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details Datasheet

iShield Key

The iShield Key by Swissbit stands out as a robust hardware security solution designed to protect digital identities. It supports features like Personal Identity Verification (PIV), and enables one-time password (OTP) generation with HOTP and TOTP protocols. This flexibility makes it suitable for a wide range of authentication applications, significantly reducing the risk of account breaches through multifactor authentication techniques that combat threats such as phishing and social engineering. Designed to plug directly into USB ports, this device offers a simple yet secure way to add hardware security layers to existing systems.

Swissbit AG
24 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

PQPlatform CoPro

PQPlatform CoPro consolidates high-performance hash and lattice-based cryptography in one entity, specifically designed for minimal system integration effort while maximizing cryptographic capability. It's aimed at enhancing existing security infrastructures with post-quantum capabilities, maintaining operational efficiency while providing solid side-channel countermeasures.

PQShield
22 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

RISC-V CPU IP NA Class

The NA Class processor addresses the rigorous needs of the automotive industry, adhering to ISO 26262 Functional Safety standards which support applications requiring ASIL-B and ASIL-D levels of safety integrity. This 64-bit processor is equipped with advanced safety features ensuring it meets the high standards and reliability necessary for automotive applications. Its architecture supports a variety of extensions and user-defined instructions, allowing automotive companies to customize the processor to suit various needs, such as autonomous driving aid systems and automotive communication protocols. The accompanying ecosystem offers tools, SDKs, and operating support for real-time applications, providing a complete embedded solution aimed at the rapid and safe advancement of modern automotive technologies.

Nuclei System Technology
22 Views
CPU, FlexRay, Platform Security, Processor Cores
View Details Datasheet

MAC Privacy Protection IP

The MAC Privacy Protection core by Comcores offers an advanced layer of security for Ethernet systems. It addresses privacy concerns by introducing innovative measures for protecting MAC addresses and other sensitive information during data transmission. With a focus on cybersecurity needs, this core enhances data integrity and ensures confidentiality, allowing systems to operate without the risk of data breaches. It positions itself as an essential component in networks that require stringent privacy controls while maintaining operational efficiency.

Comcores
21 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

NVM Defender

NVM Defender is a groundbreaking technology designed to shield Integrated Circuits from common invasive attacks, particularly those aimed at extracting non-volatile memory (NVM) codes. It represents a significant advancement in hardware security, ensuring that critical design elements such as embedded software, cryptographic keys, and personal data are safeguarded. By integrating NVM Defender, chips are fortified against copying, emulation, and other forms of counterfeiting. This solution operates autonomously, detecting potential threats in real-time, rendering bypass attempts ineffective. This robust defense mechanism is proficient in maintaining security by design, a feature that is crucial in deterring unauthorized access across electronic devices. NVM Defender's structure inherently challenges any bypass techniques, ensuring that intrusions remain impractical. Its cost-effectiveness and ease of integration make it an attractive option for chip manufacturers and integrators looking to protect assets from intellectual property theft and replication. Furthermore, NVM Defender is not just a software solution but an embedded module, requiring minimal intervention from external platforms. This feature makes it reliable even when software vulnerabilities are exploited during attacks. It is the world's first digital solution specifically developed to combat embedded code extraction vulnerabilities, amplifying the security layers of semiconductor devices against emerging threats.

Texplained
21 Views
Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

RISC-V CPU IP NS Class

The NS Class processor encompasses tools for high-security applications, including fintech payment systems and IoT security. It harnesses RISC-V's open standards, providing an architecture that is both flexible and secure for sensitive operations. The NS Class is designed for scenarios that demand reliable security, implementing features that protect both data and functionality, ensuring peace of mind in its application. This processor supports an extensive toolchain and ecosystem resources, including SDK and RTOS/Linux, making it a compelling option for sectors where security cannot be compromised. Its configurability ensures tailored solutions, optimizing power and operational efficiency, making it eminently suitable for secure IoT implementations.

Nuclei System Technology
21 Views
CPU, Cryptography Cores, Platform Security, Processor Cores
View Details Datasheet

Substation Automation Systems Cryptographic COEsec

The Substation Automation Systems Cryptographic COEsec offers advanced cryptographic solutions tailored for substation automation systems. Ensuring secure and reliable data transmission, this core addresses the crucial need for cybersecurity in industrial automation. It provides robust encryption and decryption mechanisms designed to protect sensitive information from unauthorized access and cyber threats.<br><br>This IP is integral to safeguarding communication channels within power substations, ensuring that operations remain secure and resilient to potential attacks. It supports a wide variety of encryption standards, allowing it to be seamlessly integrated into different systems for enhanced cybersecurity.</br><br>Designed for power utility companies and sectors requiring fortified security measures, the COEsec core provides a secure environment to manage operations without compromising on efficiency or reliability. By offering high-level encryption and security features, it stands as a critical component in designing safe and resilient industrial networks.

Concurrent EDA, LLC
21 Views
TSMC
28nm
Embedded Security Modules, Ethernet, Platform Security
View Details Datasheet

PQPlatform Hash

PQPlatform Hash acts as a hardware accelerator specializing in hash-based signature schemes. It supports various Hash-Based Signature Schemes (HBSS) like LMS and XMSS, providing boosting capabilities for embedded devices demanding high signature verification throughput. PQPlatform Hash is engineered to balance memory and processing efficiency, making it suitable for constrained environments needing high-performance cryptographic operations.

PQShield
18 Views
AMBA AHB / APB/ AXI, Cryptography Cores, Platform Security
View Details Datasheet

NeoPUF

NeoPUF stands out as a critical Hardware Security IP by eMemory, leveraging PUF (Physical Unclonable Function) technology to provide an unprecedented level of security. This technology plays a fundamental role in protecting sensitive information from potential security threats throughout the lifecycle of a semiconductor. It offers a trusted path for secure key generation and storage, making its mark in industries from automotive to IoT.\n\nNeoPUF's design draws from unique micro-architectures inherent to each chip, ensuring a secure root of trust that is both robust and unclonable. The technology is exceptionally efficient in combating cloning and counterfeiting attempts, providing peace of mind in high-security environments where data integrity is paramount.\n\nWith its state-of-the-art technology, NeoPUF enables manufacturers to achieve secure encryption and authentication, laying down a secure foundation for hardware security. This IP upholds eMemory's commitment to advancing secure technology solutions, providing significant support to companies prioritizing security in their semiconductor products.

eMemory Technology Inc
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet
Chat to Volt about this page

Chatting with Volt