Find IP Sell IP Chip Talk About Us Contact Us
Log In

All IPs > Security IP > Security Subsystems

Advanced Security Subsystems Semiconductor IP

In the world of integrated circuits, Security Subsystems Semiconductor IPs play a vital role in ensuring the confidentiality, integrity, and authenticity of data. These subsystems are meticulously designed to be incorporated into larger systems, providing robust security features crucial for combating the ever-evolving cyber threats. They are essential for a wide array of applications, including IoT devices, automotive systems, and consumer electronics, which demand stringent security measures.

Security subsystems often include components such as encryption and decryption engines, secure boot mechanisms, key management systems, and hardware-based random number generators. These components work in harmony to secure data transactions and storage within an electronic device. By integrating such advanced security features directly into the silicon, device manufacturers can significantly enhance the overall security posture of their products.

Furthermore, these security IPs are not only about protecting sensitive data but also about ensuring device integrity. Features such as tamper detection, secure firmware update, and access control play critical roles in preventing unauthorized access and modifications. This is particularly important in sectors like automotive, where safety and privacy are paramount, and IoT, where devices are often part of a broader network and are susceptible to remote attacks.

Products in the Security Subsystems category offer versatile and scalable solutions that cater to varying security requirements. They are designed to address specific needs, whether it's for securing a smartphone, enabling safe digital payment services, or protecting a vehicle's communication protocols. By choosing the right security subsystem semiconductor IP, developers can build products that not only perform efficiently but also comply with the highest security standards in today's connected world.

All semiconductor IP
15
IPs available

PUFrt

PUFrt is a hardware-based root of trust solution that integrates seamlessly into a variety of semiconductor environments. It features a comprehensive security foundation with a 1024-bit Physical Unclonable Function (PUF) and a true random number generator compliant with NIST SP800-90B/SP-800-22 standards. This solution provides a robust platform for key generation and storage, ensuring sensitive data never leaves the chip. With built-in anti-tamper design and an 8k-bit secure storage space, PUFrt is capable of safeguarding vital data against physical attacks. Designed for flexibility, it supports multiple cryptographic operations and integrates easily into various architectures, providing a fortified base for semiconductor security, vital for applications such as secure boot and trusted execution environments.

PUFsecurity
53 Views
TSMC
28nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

PUFcc

PUFcc stands as a state-of-the-art crypto coprocessor, embedding a robust hardware root of trust with a complete suite of cryptographic algorithms essential for securing modern devices. It unites essential elements such as key generation, storage, and a comprehensive crypto engine into one cohesive package. Noteworthy for its adaptability, PUFcc is designed to effortlessly integrate into numerous system architectures, supporting applications across IoT, automotive, and FinTech industries. It provides crucial security features including secure boot, over-the-air updates, and advanced key management capabilities. The suite of NIST CAVP and OSCCA certified algorithms within ensures a high degree of trust and compliance, crucial for maintaining secure communications and data integrity throughout the product lifecycle.

PUFsecurity
42 Views
TSMC
28nm
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

Secure OTP

Secure OTP is an advanced storage solution utilizing anti-fuse one-time programmable (OTP) memory to protect sensitive data in integrated circuits. With enhanced capabilities over standard OTP systems, Secure OTP offers a unique physical macro and digital RTL design that ensures maximum security for stored data, be it in use, transit, or rest. It features a 1024-bit PUF for improved encryption and supports multiple interfaces for seamless integration across a broad range of applications. The solution mitigates security vulnerabilities in modern chip designs, providing robust protection against data theft and unauthorized access to critical information such as encryption keys and boot codes. This technology is aimed at applications requiring secure data storage, including IoT devices and smart electronics.

PUFsecurity
41 Views
TSMC
28nm
Cryptography Cores, Embedded Memories, Embedded Security Modules, Security Subsystems, SRAM Controller
View Details Datasheet

SphinX

SphinX provides industry-standard encryption and decryption using high-performance, low-latency AES-XTS technology. Its design features independent, non-blocking encryption and decryption channels, ensuring data security is maintained without impeding processing speed or system throughput. SphinX is tailored for environments where data protection is paramount, delivering robust security capabilities while preserving system efficiency and performance.

ZeroPoint Technologies
37 Views
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

FortiCrypt

FortiCrypt offers a comprehensive lineup of AES solutions, explicitly engineered for robust defense against side-channel attacks (SCA) and fault injection attacks (FIA), including variants like SIFA. Highlighting exceptional performance, these solutions employ masking techniques based on finite field arithmetic. These mechanisms ensure encryption and decryption processes are secure, while maintaining impressive speeds without additional latency. Balancing high security, low gate count, and power consumption, FortiCrypt products are available in configurations focusing on performance, power efficiency, or compact design options. With TVLA methodology verification and Common Criteria accreditations, FortiCrypt products are designed to thrive in even the most vulnerable situations. The suite supports ultra-high performance, ultra-low power efficiency, significant gate count reduction, and satisfies diverse industrial needs, making it applicable for both high-end and existing field devices vulnerable due to insufficient original protections. Moreover, FortiCrypt can be utilized with AMBA, AXI, or APB buses, offering a hardware-software solution integrated into diverse circuit architectures, thus ensuring comprehensive compatibility and security across systems.

FortifyIQ
35 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) represents Crossbar's commitment to enhancing security at the hardware level, leveraging its highly efficient ReRAM technology. This module serves as a secure enclave within devices, protecting sensitive information from unauthorized access and potential attacks. By employing Crossbar's ReRAM-based PUF (Physical Unclonable Function) cryptographic keys, the PHSM ensures that each device has a unique digital fingerprint, preventing cloning and adding a robust layer of security. The PHSM is designed to address the growing security concerns in modern electronic devices, especially in sectors like automotive, industrial, and medical industries where data integrity is paramount. With its ability to handle extensive security protocols and encryption methods, the PHSM is crucial for safeguarding data in connected devices, providing secure authentication, and ensuring data confidentiality and integrity. Crossbar's technology allows for the seamless integration of the PHSM into existing semiconductor processes, enhancing security without compromising on device performance or energy efficiency. Moreover, the PHSM offers a highly reliable and tamper-resistant solution that can withstand a variety of environmental conditions. Whether it's for securing IoT endpoints, mobile computing platforms, or large-scale data centers, the PHSM is equipped to handle the demands of modern security requirements efficiently and effectively. Its deployment within a device's architecture ensures that sensitive operations remain isolated and protected, providing peace of mind in an increasingly connected world.

Crossbar
32 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

Post-Quantum Cryptography IP

Post-Quantum Cryptography IP addresses the emerging challenges presented by quantum computing threats. This IP includes hardware accelerators that are prepared for lattice-based algorithms, ensuring strong defense capabilities against future cyber threats. It is designed for configurable performance, offering tunable power and area efficiency, which is essential for maintaining security standards as quantum computing evolves. This solution is tailored to secure cryptographic operations, ensuring data remains protected amidst advancements in computational technologies.

Secure-IC
31 Views
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Securyzr iSSP

The Securyzr iSSP is a holistic security lifecycle management solution that integrates secure services across all phases of a device's existence. It allows for seamless provisioning, firmware updates, security monitoring, and device identity management in a zero-touch manner. This platform facilitates efficient management and extensive security oversight, empowering enterprises to handle security change implementation smoothly.

Secure-IC
30 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Aeonic Insight

Aeonic Insight provides advanced on-die telemetry, offering chip designers significant insights into power grids, clock health, and SoC security. It's tailored for use in complex applications like data centers, AI, 5G, aerospace, and automotive where high observability and programmability are essential. The IP's sensors integrate with third-party platforms to enhance silicon lifecycle analytics, delivering actionable data for refined design decision-making.

Movellus
29 Views
Analog Front Ends, Security Subsystems, Sensor
View Details Datasheet

SASCrypt: Cryptographic for Substation Automation Systems

SASCrypt: Cryptographic for Substation Automation Systems provides advanced security solutions tailored for the critical infrastructure of substation automation. This product ensures that data integrity, confidentiality, and authenticity are maintained across vital communications within power systems. Utilizing robust cryptographic techniques, SASCrypt protects against unauthorized data access and tampering, vital in substation environments where security breaches can lead to significant operational disruptions. It integrates seamlessly with existing systems, ensuring a streamlined enhancement to security protocols without necessitating major infrastructural overhauls. This cryptographic solution is a critical component in maintaining the secure operation of automated substations, providing peace of mind with its rigorous adherence to security standards. Its deployment ensures that sensitive data transmitted across networks remains uncompromised, safeguarding power transmission and distribution operations.

System-on-Chip Engineering, S.L. (SoC-e)
27 Views
Content Protection Software, Cryptography Cores, Security Subsystems
View Details Datasheet

SiFive Intelligence X280

Designed to meet the future needs of AI technology, the SiFive Intelligence family introduces AI dataflow processors with scalable vector compute capabilities. The X280 model emphasizes high-performance scalar and vector computing suitable for AI workloads, data flow management, and complex processing tasks. By integrating SiFive Matrix Engine technology, the X280 enhances compute capabilities with a 512-bit vector length ensuring efficient computation flows. The platform is scalable, supporting integrations from entry-level to high-performance needs, whilst maintaining a focus on power efficiency and footprint reduction.

SiFive, Inc.
25 Views
AI Processor, Multiprocessor / DSP, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet

ReRAM Secure Keys

Crossbar’s ReRAM Secure Keys technology harnesses the potential of ReRAM to create highly secure cryptographic keys essential for safeguarding electronic devices and systems. By employing Physical Unclonable Function (PUF) technology, these keys provide unique digital identifiers that significantly enhance security measures, preventing unauthorized cloning and access to sensitive data. ReRAM PUF keys are uniquely advantageous due to their high randomness, low error rates, and resilience against environmental variability. This makes them far superior to traditional SRAM-based PUF technologies, which often suffer from greater susceptibility to various attack vectors. ReRAM’s integration into semiconductor hardware ensures that security measures such as encryption keys remain robust and isolated, thereby protecting critical operations. These cryptographic keys are ideal for a plethora of security-sensitive applications, including automotive, data centers, and IoT. By embedding ReRAM PUF keys into device security architectures, manufacturers can bolster the resilience of their products against both physical and digital threats. This technology is particularly potent for implementations within nodes smaller than 28nm, where traditional embedded non-volatile memory is less feasible. Crossbar’s Secure Keys solution represents an essential advance in maintaining data confidentiality and authenticity across a wide range of modern electronic systems.

Crossbar
23 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

iShield HSM

The Swissbit iShield HSM acts as a critical security anchor in IoT environments, offering robust hardware protection for sensitive keys used in device authentication and registration. This plug-and-play USB security module is vital for enhancing IoT designs that rely on hardware security to prevent key duplication or exposure in software-based environments. Its design facilitates seamless upgrades of existing IoT infrastructure with advanced security modules without the need for redesigning hardware. Capable of securely storing private key and certificate information, the iShield HSM ensures that sensitive cryptographic elements remain shielded from potential cyber threats. It's especially valuable for updating AWS IoT Greengrass devices, where hardware security can significantly bolster system resilience. Its high compatibility across platforms encourages wide adoption by offering seamless integration into diverse IoT setups.

Swissbit AG
22 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

NVM Defender

NVM Defender is a groundbreaking technology designed to shield Integrated Circuits from common invasive attacks, particularly those aimed at extracting non-volatile memory (NVM) codes. It represents a significant advancement in hardware security, ensuring that critical design elements such as embedded software, cryptographic keys, and personal data are safeguarded. By integrating NVM Defender, chips are fortified against copying, emulation, and other forms of counterfeiting. This solution operates autonomously, detecting potential threats in real-time, rendering bypass attempts ineffective. This robust defense mechanism is proficient in maintaining security by design, a feature that is crucial in deterring unauthorized access across electronic devices. NVM Defender's structure inherently challenges any bypass techniques, ensuring that intrusions remain impractical. Its cost-effectiveness and ease of integration make it an attractive option for chip manufacturers and integrators looking to protect assets from intellectual property theft and replication. Furthermore, NVM Defender is not just a software solution but an embedded module, requiring minimal intervention from external platforms. This feature makes it reliable even when software vulnerabilities are exploited during attacks. It is the world's first digital solution specifically developed to combat embedded code extraction vulnerabilities, amplifying the security layers of semiconductor devices against emerging threats.

Texplained
21 Views
Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

WiseEye2 AI Solution

The WiseEye2 AI solution from Himax represents a significant leap in ultralow power AI processing, particularly suited for IoT devices. It combines an advanced AI microcontroller with proprietary CMOS image sensors, facilitating continuous operation and data processing at remarkably low power levels. This solution is perfect for applications requiring persistent AI-driven insights, such as smart home devices, consumer electronics, and industrial sensing applications where battery conservation is critical. Built with Arm's Cortex-M55 CPU and the Ethos-U55 NPU, WiseEye2 supports complex neural network computations while maintaining a high standard of energy efficiency. These characteristics allow it to handle more sophisticated algorithms, yielding precise real-time processing and actionable insights. The cutting-edge architecture ensures that devices can operate autonomously for extended periods on minimal power supply. Security features are robust, employing industry-standard cryptography to safeguard sensitive data, making it ideal for applications where privacy and data integrity are paramount. Himax’s WiseEye2 solution continues the company's tradition of pioneering technology that transcends conventional limitations, enabling smarter, more efficient endpoint AI functionalities.

Himax Technologies, Inc.
20 Views
AI Processor, Embedded Security Modules, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet
Chat to Volt about this page

Chatting with Volt