Find IP Sell IP Chip Talk About Us Contact Us
Log In

Tiempo Secure

Tiempo Secure is a prominent player in the semiconductor industry, specializing in providing advanced security solutions for integrated circuit (IC) design and production. The company is dedicated to developing cutting-edge technologies that address the growing demands for security in today's interconnected world. With a strong focus on cybersecurity for embedded systems, Tiempo Secure offers a range of innovative products and services that are designed to protect digital assets and enhance cryptographic foundations. The company's flagship product, the TESIC Secure Enclave, provides comprehensive security solutions for various applications including IoT, automotive, cellular communications, and more. By ensuring the integrity and security of systems against both physical and digital attacks, the TESIC Secure Enclave helps safeguard electronic identities and secure communications. Tiempo Secure is committed to achieving the highest standards in security certification, offering pre-certified solutions that comply with industry benchmarks such as SESIP, FIPs, and Common Criteria. They also specialize in secure provisioning services, which include key management and interfacing with manufacturing sites to maintain a secure chain of trust during the production process. As a RISC-V Strategic Partner, Tiempo Secure stands out in their ability to integrate robust security features into RISC-V architecture, transforming products into secure devices. The company's expertise in security and certification facilitates smoother processes for achieving necessary certifications and aligning SoC designs with required security standards. Read more

Is this your business? Claim it to manage your IP and profile

7
IPs available

True Random Number Generator (TRNG)

Tiempo Secure's True Random Number Generator (TRNG) is a cryptographic IP core designed to infuse high levels of security in digital systems. This module is vital for generating unpredictable random numbers used across various cryptographic functions such as key generation, encryption, digital signatures, and more. The TRNG is crafted to adhere to the highest standards of randomness and security as outlined by NIST and AIS31 test suites. It supports crucial protocols in secure communications like IPsec, MACsec, and TLS/SSL while providing raw data access for AIS31 characterization and incorporating comprehensive health tests. With its ability to integrate seamlessly into existing designs, the TRNG stands as a critical element for enhancing system security. Its implementation includes wrappers for standard buses such as APB and AXI, ensuring compatibility and ease of integration into existing SoC architectures. The TRNG is a cornerstone for secure device operation, ensuring that cryptographic operations maintain their integrity and randomness, thereby safeguarding against potential security breaches in the system.

Tiempo Secure
41 Views
Cryptography Cores
View Details Datasheet

Post-Quantum Cryptography (PQC)

Tiempo Secure's Post-Quantum Cryptography (PQC) is designed to offer protection against emerging quantum computing threats, ensuring that cryptographic systems remain secure in the future. This cryptographic solution integrates advanced algorithms that are resilient to quantum attacks, providing a robust next-generation security layer. Key components of the PQC offering include quantum-resistant code signatures, key encapsulation mechanisms, and digital signatures, leveraging advanced algorithms such as the Leighton-Micali Hash-Based Signature Scheme, Crystals-Dilithium, and Crystals-Kyber. These mechanisms are engineered to provide future-proof security, aligning with evolving cryptographic requirements. Tailored for adaptability, PQC ensures dependable security through architecture-ready, hardware-accelerated algorithms that fit into various digital systems. This adaptability makes it suitable for applications seeking enhanced protective measures against quantum threats. With PQC, Tiempo Secure offers a forward-looking approach to securing digital assets, ensuring they are safeguarded from the potential risks posed by quantum computing advancements. This makes it an essential component for modern security strategies, providing peace of mind in a fast-evolving technological landscape.

Tiempo Secure
39 Views
Cryptography Cores
View Details Datasheet

PSA Compliant Crypto API

The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.

Tiempo Secure
39 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details Datasheet

Secure Boot

Tiempo Secure's Secure Boot IP offers a robust mechanism for verifying the integrity of firmware during the booting process. Emphasizing on security, the Secure Boot IP guarantees that only authenticated firmware can be loaded onto the application processor. This capability is particularly essential for preventing unauthorized modifications and ensuring the system's integrity right from startup. The Secure Boot implements the Post-Quantum Secure LMS algorithm, which is in line with NIST's standards. This ensures resistance against downgrading attacks by preventing firmware rollback. A unique feature is its ability to support firmware updates, handling up to 32K updates while storing a compact 2.8 KBytes signature alongside the firmware. The design is highly flexible and portable, with optimization options available in C and assembly code for various platforms. It allows the use of standardized post-quantum algorithms, endorsing a security level up to 256-bit. Additionally, it features extensive logging facilities, support for AES-CTR encryption, and compliance with MISRA C standards. Overall, the Secure Boot IP is highly adaptive and can easily integrate with different systems, providing a strong defense mechanism to enhance the security of any digital device.

Tiempo Secure
36 Views
View Details Datasheet

SHA-2 Crypto Engine

The SHA-2 Crypto Engine from Tiempo Secure delivers advanced hashing functionality that is pivotal for ensuring data integrity and security in various applications. This IP core stands out for its efficient processing capabilities, supporting hashing functions like SHA-256 and SHA-224. Designed with a 1 cycle per round architecture, the SHA-2 Crypto Engine supports both the import and export of SHA-256 states, catering to even the most complex cryptographic operations. Its ability to handle any message length with bit granularity makes it versatile for wide-ranging applications. Internal padding is seamlessly handled within the IP, and for ease of integration, it comes with wrappers for standard buses such as APB and AXI. This ensures it fits well into a plethora of existing designs, making it a reliable choice for implementing digital signatures and data integrity checks. A unique feature of the SHA-2 Crypto Engine is its readiness to handle pre-padded payloads, optimizing processing without compromising on performance. It empowers developers to boost their system's security robustness while benefiting from an optimized silicon resource-to-performance ratio.

Tiempo Secure
34 Views
Cryptography Cores
View Details Datasheet

SHA-3 Crypto Engine

Tiempo Secure's SHA-3 Crypto Engine is an advanced cryptographic module that offers exceptional flexibility and performance for modern security needs. Emphasizing scalability, the engine supports varying numbers of hashing rounds per clock cycle, optimizing the silicon resource usage while ensuring high throughput. One of the key features is the ability to select between fixed-length and extendable-output functions (XOF) for each message, catering to diverse application requirements. This flexibility is easily manageable through simple configuration settings, making it adaptable to specific needs. Internally, the SHA-3 engine manages message padding and allows for efficient import/export of the KECCAK-p state. The architecture is designed for integration simplicity, featuring wrappers compatible with standard bus protocols like APB and AXI, facilitating smooth incorporation into a myriad of systems. In addition to supporting SHA-3 standard functions, it accelerates the Kangaroo Twelve algorithm, offering a comprehensive suite of cryptographic tools for enhanced data security and integrity across various applications.

Tiempo Secure
33 Views
Cryptography Cores
View Details Datasheet

TESIC Secure Enclave IP

The TESIC Secure Enclave by Tiempo Secure offers an advanced security solution for System-on-Chip (SoC) and Application-Specific Integrated Circuit (ASIC) designs. In an era where cybersecurity is crucial, especially with the increase in electronic identities and connected devices, this Secure Enclave provides a critical layer of protection. Functioning as a Hardware Secure Module (HSM) or Root of Trust (RoT), it secures systems against various physical and logical threats, which is essential for sectors such as IoT, automotive, and cellular communications. The TESIC Secure Enclave is packed with features such as Secure Boot, Post-Quantum Cryptography (PQC), and PSA Crypto APIs. It is engineered to deliver full customizable solutions to meet unique customer requirements, integrating seamlessly without demanding in-depth security expertise. This pre-certified solution enables developers to achieve superior security certification standards, like SESIP, FIPS, and Common Criteria EAL5+/EAL6+. Moreover, the TESIC Secure Enclave is compliant with functional safety standards ISO 26262 ASIL B & D, making it ideal for automotive SoC developments. These products support encrypted communication, secure firmware updates, and robust storage solutions, ensuring data confidentiality and integrity across multiple applications and use cases. Its applications span various fields including cellular connectivity, payment systems, digital identity, and more. The TESIC Secure Enclave aligns with major security standards and offers comprehensive security certifications, providing peace of mind and validated protection to chipset manufacturers and their products.

Tiempo Secure
28 Views
View Details Datasheet
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chat to Volt about this page

Chatting with Volt