Is this your business? Claim it to manage your IP and profile
Tiempo Secure's True Random Number Generator (TRNG) is a cryptographic IP core designed to infuse high levels of security in digital systems. This module is vital for generating unpredictable random numbers used across various cryptographic functions such as key generation, encryption, digital signatures, and more. The TRNG is crafted to adhere to the highest standards of randomness and security as outlined by NIST and AIS31 test suites. It supports crucial protocols in secure communications like IPsec, MACsec, and TLS/SSL while providing raw data access for AIS31 characterization and incorporating comprehensive health tests. With its ability to integrate seamlessly into existing designs, the TRNG stands as a critical element for enhancing system security. Its implementation includes wrappers for standard buses such as APB and AXI, ensuring compatibility and ease of integration into existing SoC architectures. The TRNG is a cornerstone for secure device operation, ensuring that cryptographic operations maintain their integrity and randomness, thereby safeguarding against potential security breaches in the system.
Tiempo Secure's Post-Quantum Cryptography (PQC) is designed to offer protection against emerging quantum computing threats, ensuring that cryptographic systems remain secure in the future. This cryptographic solution integrates advanced algorithms that are resilient to quantum attacks, providing a robust next-generation security layer. Key components of the PQC offering include quantum-resistant code signatures, key encapsulation mechanisms, and digital signatures, leveraging advanced algorithms such as the Leighton-Micali Hash-Based Signature Scheme, Crystals-Dilithium, and Crystals-Kyber. These mechanisms are engineered to provide future-proof security, aligning with evolving cryptographic requirements. Tailored for adaptability, PQC ensures dependable security through architecture-ready, hardware-accelerated algorithms that fit into various digital systems. This adaptability makes it suitable for applications seeking enhanced protective measures against quantum threats. With PQC, Tiempo Secure offers a forward-looking approach to securing digital assets, ensuring they are safeguarded from the potential risks posed by quantum computing advancements. This makes it an essential component for modern security strategies, providing peace of mind in a fast-evolving technological landscape.
The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.
Tiempo Secure's Secure Boot IP offers a robust mechanism for verifying the integrity of firmware during the booting process. Emphasizing on security, the Secure Boot IP guarantees that only authenticated firmware can be loaded onto the application processor. This capability is particularly essential for preventing unauthorized modifications and ensuring the system's integrity right from startup. The Secure Boot implements the Post-Quantum Secure LMS algorithm, which is in line with NIST's standards. This ensures resistance against downgrading attacks by preventing firmware rollback. A unique feature is its ability to support firmware updates, handling up to 32K updates while storing a compact 2.8 KBytes signature alongside the firmware. The design is highly flexible and portable, with optimization options available in C and assembly code for various platforms. It allows the use of standardized post-quantum algorithms, endorsing a security level up to 256-bit. Additionally, it features extensive logging facilities, support for AES-CTR encryption, and compliance with MISRA C standards. Overall, the Secure Boot IP is highly adaptive and can easily integrate with different systems, providing a strong defense mechanism to enhance the security of any digital device.
The SHA-2 Crypto Engine from Tiempo Secure delivers advanced hashing functionality that is pivotal for ensuring data integrity and security in various applications. This IP core stands out for its efficient processing capabilities, supporting hashing functions like SHA-256 and SHA-224. Designed with a 1 cycle per round architecture, the SHA-2 Crypto Engine supports both the import and export of SHA-256 states, catering to even the most complex cryptographic operations. Its ability to handle any message length with bit granularity makes it versatile for wide-ranging applications. Internal padding is seamlessly handled within the IP, and for ease of integration, it comes with wrappers for standard buses such as APB and AXI. This ensures it fits well into a plethora of existing designs, making it a reliable choice for implementing digital signatures and data integrity checks. A unique feature of the SHA-2 Crypto Engine is its readiness to handle pre-padded payloads, optimizing processing without compromising on performance. It empowers developers to boost their system's security robustness while benefiting from an optimized silicon resource-to-performance ratio.
Tiempo Secure's SHA-3 Crypto Engine is an advanced cryptographic module that offers exceptional flexibility and performance for modern security needs. Emphasizing scalability, the engine supports varying numbers of hashing rounds per clock cycle, optimizing the silicon resource usage while ensuring high throughput. One of the key features is the ability to select between fixed-length and extendable-output functions (XOF) for each message, catering to diverse application requirements. This flexibility is easily manageable through simple configuration settings, making it adaptable to specific needs. Internally, the SHA-3 engine manages message padding and allows for efficient import/export of the KECCAK-p state. The architecture is designed for integration simplicity, featuring wrappers compatible with standard bus protocols like APB and AXI, facilitating smooth incorporation into a myriad of systems. In addition to supporting SHA-3 standard functions, it accelerates the Kangaroo Twelve algorithm, offering a comprehensive suite of cryptographic tools for enhanced data security and integrity across various applications.
The TESIC Secure Enclave by Tiempo Secure offers an advanced security solution for System-on-Chip (SoC) and Application-Specific Integrated Circuit (ASIC) designs. In an era where cybersecurity is crucial, especially with the increase in electronic identities and connected devices, this Secure Enclave provides a critical layer of protection. Functioning as a Hardware Secure Module (HSM) or Root of Trust (RoT), it secures systems against various physical and logical threats, which is essential for sectors such as IoT, automotive, and cellular communications. The TESIC Secure Enclave is packed with features such as Secure Boot, Post-Quantum Cryptography (PQC), and PSA Crypto APIs. It is engineered to deliver full customizable solutions to meet unique customer requirements, integrating seamlessly without demanding in-depth security expertise. This pre-certified solution enables developers to achieve superior security certification standards, like SESIP, FIPS, and Common Criteria EAL5+/EAL6+. Moreover, the TESIC Secure Enclave is compliant with functional safety standards ISO 26262 ASIL B & D, making it ideal for automotive SoC developments. These products support encrypted communication, secure firmware updates, and robust storage solutions, ensuring data confidentiality and integrity across multiple applications and use cases. Its applications span various fields including cellular connectivity, payment systems, digital identity, and more. The TESIC Secure Enclave aligns with major security standards and offers comprehensive security certifications, providing peace of mind and validated protection to chipset manufacturers and their products.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.