Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Security Subsystems

Advanced Security Subsystems Semiconductor IP

In the world of integrated circuits, Security Subsystems Semiconductor IPs play a vital role in ensuring the confidentiality, integrity, and authenticity of data. These subsystems are meticulously designed to be incorporated into larger systems, providing robust security features crucial for combating the ever-evolving cyber threats. They are essential for a wide array of applications, including IoT devices, automotive systems, and consumer electronics, which demand stringent security measures.

Security subsystems often include components such as encryption and decryption engines, secure boot mechanisms, key management systems, and hardware-based random number generators. These components work in harmony to secure data transactions and storage within an electronic device. By integrating such advanced security features directly into the silicon, device manufacturers can significantly enhance the overall security posture of their products.

Furthermore, these security IPs are not only about protecting sensitive data but also about ensuring device integrity. Features such as tamper detection, secure firmware update, and access control play critical roles in preventing unauthorized access and modifications. This is particularly important in sectors like automotive, where safety and privacy are paramount, and IoT, where devices are often part of a broader network and are susceptible to remote attacks.

Products in the Security Subsystems category offer versatile and scalable solutions that cater to varying security requirements. They are designed to address specific needs, whether it's for securing a smartphone, enabling safe digital payment services, or protecting a vehicle's communication protocols. By choosing the right security subsystem semiconductor IP, developers can build products that not only perform efficiently but also comply with the highest security standards in today's connected world.

All semiconductor IP
18
IPs available

SphinX

SphinX provides industry-standard encryption and decryption using high-performance, low-latency AES-XTS technology. Its design features independent, non-blocking encryption and decryption channels, ensuring data security is maintained without impeding processing speed or system throughput. SphinX is tailored for environments where data protection is paramount, delivering robust security capabilities while preserving system efficiency and performance.

ZeroPoint Technologies
74 Views
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

PUFrt

PUFrt is a foundational security solution that equips semiconductors with hardware root key generation and storage, essential for establishing a Hardware Root of Trust. It introduces a 1024-bit PUF-based identification code and a true random number generator (TRNG) that comply with stringent cryptographic standards, enhancing data protection against diverse threats. The design includes secure OTP storage and an anti-tamper shell, providing a robust defense against physical attacks. Assured compatibility with varied architectures allows PUFrt to integrate seamlessly, offering key provisioning and securing critical data across system platforms.

PUFsecurity
71 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Secure OTP

Secure OTP offers advanced anti-fuse memory protection, serving as a reliable safeguard for embedded non-volatile memory. Integrating Physical Macros and Digital RTL, it provides a robust solution for sensitive data storage such as keys and boot code. With a 1024-bit PUF, Secure OTP handles data scrambling and IO shuffling, ensuring high-security protection against physical threats. Its universality in integration across multiple ASIC applications makes it an integral component in securing data within IoT devices and extending its utility to diverse markets such as PCIe and Smart TVs.

PUFsecurity
67 Views
Cryptography Cores, Embedded Memories, Embedded Security Modules, Security Subsystems, SRAM Controller
View Details Datasheet

PUFcc

PUFcc is a crypto coprocessor that combines a Hardware Root of Trust with a comprehensive suite of cryptographic capabilities. It integrates seamlessly into various system architectures, providing a complete security protocol solution required for IoT and AI technologies. The PUFcc leverages its foundational PUFrt's secure design while enhancing cryptographic functionality with certified algorithms. This drop-in IP module features direct memory access, enabling faster data interaction necessary for real-time applications. Particularly with its latest iteration, the PUFcc7, improvements in algorithm performance and TLS1.3 compliance demonstrate its adaptability to evolving standards.

PUFsecurity
64 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

FortiCrypt

FortiCrypt is designed to provide AES protection against side-channel attacks (SCA) and fault injection attacks (FIA) without compromising on performance or latency. It utilizes sophisticated masking methods and has been rigorously tested using the Test Vector Leakage Assessment (TVLA) methodology. FortiCrypt supports various high-performance configurations, including ultra-high performance, ultra-low power, and a balanced approach that meets diverse security needs. These configurations allow for encryption of high-definition video streams on less powerful CPUs, making it ideal for a range of applications that require advanced security.

FortifyIQ
60 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

eSi-Crypto

The eSi-Crypto suite from EnSilica offers an extensive range of cryptographic IPs designed to provide high-quality encryption and authentication functionalities. A standout feature of this suite is its True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and ensures robust random number generation essential for secure communication. These cryptographic cores are versatile and can be easily integrated through various bus interfaces like AMBA APB/AHB and AXI.\n\nSupporting numerous algorithms such as CRYSTALS Kyber and Dilithium, ECDSA/ECC, and AES, the eSi-Crypto suite advances quantum-resilient cryptography. This feature is crucial as it prepares secure digital communications against future quantum threats. Moreover, the suite includes high-throughput solutions suitable for applications that demand both efficiency and resource optimization, like V2X communications.\n\nEnSilica's cryptographic IPs exhibit compatibility with ASIC and FPGA targets, offering low resource usage while maintaining exceptionally high throughput. The suite also encloses IPs for various SHA algorithms, ChaCha20, Poly1305, and traditional standards like RSA and TDES. This comprehensive range meeting both modern cryptographic demands ensures that data protection remains robust and flexible in diverse application scenarios.

EnSilica
54 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details Datasheet

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP encompasses advanced solutions designed to counter the potential threats posed by quantum computing. This IP includes hardware accelerators and software libraries implementing lattice-based and hash-based algorithms, offering extensive protection against various side-channel attacks. With capabilities for key generation, encapsulation, and decapsulation, this solution integrates seamlessly into AMBA interfaces, ensuring secure and efficient cryptographic processes in future-proof environments.

Secure-IC
54 Views
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module, or PHSM, by CrossBar, is designed to address the growing need for enhanced security measures in electronic devices. By leveraging CrossBar's ReRAM technology, the PHSM offers a robust solution for secure key storage and encryption, protecting devices from unauthorized access and cyber threats. It acts as a vital component in maintaining the integrity and confidentiality of data across various applications. The module incorporates cryptographic mechanisms to create a secure environment against physical and digital attacks, ensuring that sensitive information remains protected from sophisticated hacking attempts. The intrinsic characteristics of ReRAM technology, such as its high randomness and low bit error rates, form the core of the PHSM's ability to deter potential attacks. Engineered with a focus on root of trust applications, the PHSM reinforces secure authentication processes, which are crucial in industries like automotive, medical, and IoT-based systems. The compact design aids in seamless integration within semiconductor hardware, thereby supporting diverse applications that demand rigorous security protocols.

CrossBar Inc.
53 Views
All Foundries
28nm, 90nm, 500nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, is a robust lifecycle management solution tailored for secure deployment, supply, and management of embedded devices. This platform facilitates zero-touch security lifecycle services such as provisioning, firmware updates, and security monitoring, thus ensuring consistent and reliable security from chip manufacture to device decommissioning. It integrates both a secure element (iSE) and a server component, creating a comprehensive chip-to-cloud security solution capable of functioning on public and private cloud environments.

Secure-IC
52 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Aeonic Insight

Aeonic Insight provides advanced on-die telemetry, offering chip designers significant insights into power grids, clock health, and SoC security. It's tailored for use in complex applications like data centers, AI, 5G, aerospace, and automotive where high observability and programmability are essential. The IP's sensors integrate with third-party platforms to enhance silicon lifecycle analytics, delivering actionable data for refined design decision-making.

Movellus
50 Views
Analog Front Ends, Security Subsystems, Sensor
View Details Datasheet

Quantum Resistant Encryption Core

The Quantum Resistant Encryption Core by Crypto Quantique is engineered to provide unparalleled security for IoT devices through its integration of quantum technology. This core is designed to defend against the potential future threats posed by quantum computers, ensuring long-term data security. It utilizes advanced quantum algorithms that offer higher levels of encryption compared to traditional methods, making it highly resilient to attempts at unauthorized access. A major advantage of this encryption core lies in its capacity to offer both future-proof and adaptable security protocols. These features are essential for modern IoT devices, which require not only resistant infrastructures to potential quantum-level risks but also flexibility in deployment across various platforms and devices. Its design ensures that it can be embedded into a wide variety of IoT ecosystems, providing security that is scalable and responsive to an evolving threat landscape. Furthermore, this core is distinguished by its ability to seamlessly integrate with existing hardware setups. Crypto Quantique ensures that their encryption core is compatible with numerous process nodes and foundries, thereby offering broad support for different manufacturing requirements and enhancing the security framework of any digital platform. Its robust design and high compatibility make it a valuable asset for any organization aiming to protect sensitive information sustainably and effectively.

Crypto Quantique
47 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

NVM Defender

NVM Defender is a comprehensive solution designed to fortify non-volatile memory structures against potential security breaches. With its advanced protection features, NVM Defender provides a robust countermeasure against unauthorized access, ensuring data integrity and confidentiality. The solution is tailored to address the intricate security challenges that arise in various types of memory circuits, safeguarding them from both invasive and non-invasive attacks. Its implementation is crucial for applications demanding high-security standards, such as finance and personal data protection.

Texplained
42 Views
Embedded Security Modules, NVM Express, Platform Security, Security Subsystems
View Details Datasheet

ReRAM Secure Keys

ReRAM Secure Keys by CrossBar provide a cutting-edge solution for applications requiring a robust security framework. This technology leverages the unique characteristics of ReRAM technology to generate cryptographic keys that serve as the foundation for secure device operations. These keys function as Digital Fingerprints, crucial in preventing unauthorized access and copying. ReRAM Secure Keys technology surpasses traditional SRAM-based security solutions, offering high randomness, low error rates, and strong resistance to tampering. It is particularly well-suited for devices in IoT, computing, and infrastructure where security threats are prevalent and systems require stringent protective measures. This solution enhances device root of trust, a vital component for authentication and encryption processes. Its ability to securely maintain cryptographic keys even in foundry nodes smaller than 28nm underscores its versatility and strength in the industry's pursuit of high-security standards across various electronic applications.

CrossBar Inc.
42 Views
All Foundries
28nm, 90nm, 250nm
Cryptography Cores, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

SiFive Intelligence X280

The SiFive Intelligence X280 processor is engineered for high-performance AI dataflow applications, providing scalable vector computing abilities tailored for AI, data management, and inference operations. This RISC-V-based solution integrates a high-performance control processor with vector compute resources, making it ideal for managing AI workloads efficiently. The X280 is equipped with SiFive Intelligence Extensions that enable it to address machine learning operations with enhanced performance and minimal power consumption.

SiFive, Inc.
41 Views
TSMC
12nm, 16nm
AI Processor, Multiprocessor / DSP, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet

DOME for Building Automation Systems

DOME for Building Automation Systems is a comprehensive platform designed to provide cybersecurity solutions for automation control devices in building systems. It offers a Zero Trust framework, enabling real-time endpoint protection against sophisticated cyber threats. The system is built to be easily deployable without the need for extensive IT skills or network segmentation, offering a seamless integration into legacy and new systems alike. By focusing on secure communications and device-level protection, DOME ensures that building operations remain secure and uninterrupted.

Veridify Security Inc.
39 Views
AMBA AHB / APB/ AXI, Embedded Security Modules, Platform Security, Security Subsystems, USB
View Details Datasheet

iShield HSM

Swissbit's iShield HSM is specifically engineered to enhance security in IoT deployments by securely storing critical authentication keys. As a trusted secure element, it provides a robust solution to protect against unauthorized access and duplication of sensitive data. This hardware security module is designed for seamless integration with AWS IoT Greengrass devices, enhancing the security infrastructure of existing systems with ease. The iShield HSM functions as a security anchor, securely safeguarding private keys and certificates, ensuring they are not exposed to potential vulnerabilities that software might encounter. Its plug-and-play nature allows for straightforward retrofitting into existing devices, making it an efficient choice for systems requiring heightened security over the memory bus. Particularly suited for industrial and embedded applications, the iShield HSM supports a wide range of uses, from securing system log files to protecting data streams in machine-to-machine communications. Its comprehensive encryption and access protection capabilities make it an ideal choice for organizations prioritizing data integrity and security.

Swissbit AG
38 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

WiseEye2 AI Solution

The WiseEye2 AI Solution is a transformative component in the realm of battery-operated AI applications, merging ultra-low power CMOS image technology with high-performing microcontrollers. This solution facilitates continuous operation while maintaining remarkably low power consumption, essential for maximized battery life in smart devices. Built on ARM's Cortex M55 CPU and Ethos U55 NPU, the WiseEye2 brings enhanced computational power, ensuring faster and more accurate AI inference without significant energy trade-offs. Its architecture leverages sophisticated power management techniques and security functions to deliver seamless and secure AIoT experiences. Facilitating advancements in smart home, security, and consumer electronics, WiseEye2's AI capabilities are crucial for user presence detection, facial recognition, and automated control applications. This innovation continues to support next-gen AI solutions, essential for future digital and connected environments.

Himax Technologies, Inc.
38 Views
AI Processor, Audio Processor, Embedded Security Modules, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet

DOME for Industrial Automation

Designed for the industrial sector, DOME for Industrial Automation provides robust cybersecurity measures to protect operational technology and control systems from cyber threats. Its zero-touch onboarding and management capabilities make it ideal for devices with limited resources, ensuring secure authentication and data integrity. The solution targets endpoint protection for Industrial Control Systems (ICS) which are critical in protecting industrial facilities against potential cyber incidents. DOME's compatibility with existing systems allows for efficient integration and long-term security maintenance.

Veridify Security Inc.
33 Views
AMBA AHB / APB/ AXI, Embedded Security Modules, Platform Security, Security Subsystems, USB
View Details Datasheet
Chat to Volt about this page

Chatting with Volt