Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Security Protocol Accelerators

Security Protocol Accelerators Semiconductor IP

Security Protocol Accelerators are crucial components within the realm of semiconductor IP, designed to boost the performance of security protocols in various applications. These accelerators play a pivotal role in enhancing the speed, efficiency, and reliability of data encryption and decryption processes, which are fundamental for secure communications and transactions across networks. By implementing specialized hardware for protocol acceleration, these semiconductor IPs offer significant improvements in processing speed compared to software-only solutions.

One of the primary uses of Security Protocol Accelerators is in network security devices, including routers, firewalls, and VPNs, where they ensure secure communication by accelerating tasks such as data encryption and IPsec processing. As data breaches and cyber threats continue to evolve, the demand for robust and efficient security solutions has never been higher. These accelerators enable the optimization of cryptographic operations, providing enterprises and individuals with the confidence that their sensitive data is well-protected during transmission.

In consumer electronics like smartphones, tablets, and smart home devices, security protocol accelerators are key to maintaining user privacy without compromising on performance. They ensure that devices can handle complex security tasks quickly, extending battery life and maintaining seamless user experiences. Whether it’s ensuring the security of cloud-based services or protecting communications over Wi-Fi and cellular networks, these semiconductor IPs are increasingly vital in an interconnected world.

Moreover, the rise of IoT devices and edge computing has expanded the need for security protocol accelerators. With the massive data exchange happening at the edge of networks, having efficient security IPs ensures not just the safety of the data but also compliance with regulatory standards. As companies continue to push for innovations in AI and machine learning, the integration of security protocol accelerators in their systems helps to safeguard intellectual property and sensitive algorithms, thereby maintaining a secure operational environment. Through leveraging these semiconductor IPs, creators can focus on innovation while relying on proven security foundations.

All semiconductor IP

Akida 2nd Generation

The Akida 2nd Generation continues BrainChip's legacy of low-power, high-efficiency AI processing at the edge. This iteration of the Akida platform introduces expanded support for various data precisions, including 8-, 4-, and 1-bit weights and activations, which enhance computational flexibility and efficiency. Its architecture is significantly optimized for both spatial and temporal data processing, serving applications that demand high precision and rapid response times such as robotics, advanced driver-assistance systems (ADAS), and consumer electronics. The Akida 2nd Generation's event-based processing model greatly reduces unnecessary operations, focusing on real-time event detection and response, which is vital for applications requiring immediate feedback. Furthermore, its sophisticated on-chip learning capabilities allow adaptation to new tasks with minimal data, fostering more robust AI models that can be personalized to specific use cases without extensive retraining. As industries continue to migrate towards AI-powered solutions, the Akida 2nd Generation provides a compelling proposition with its improved performance metrics and lower power consumption profile.

BrainChip
11 Categories
View Details

aiWare

The aiWare hardware neural processing unit (NPU) stands out as a state-of-the-art solution for automotive AI applications, bringing unmatched efficiency and performance. Designed specifically for inference tasks associated with automated driving systems, aiWare supports a wide array of AI workloads including CNNs, LSTMs, and RNNs, ensuring optimal operation across numerous applications.\n\naiWare is engineered to achieve industry-leading efficiency rates, boasting up to 98% efficiency on automotive neural networks. It operates across various performance requirements, from cost-sensitive L2 regulatory applications to advanced multi-sensor L3+ systems. The hardware platform is production-proven, already implemented in several products like Nextchip's APACHE series and enjoys strong industry partnerships.\n\nA key feature of aiWare is its scalability, capable of delivering up to 1024 TOPS with its multi-core architecture, and maintaining high efficiency in diverse AI tasks. The design allows for straightforward integration, facilitating early-stage performance evaluations and certifications with its deterministic operations and minimal host CPU intervention.\n\nA dedicated SDK, aiWare Studio, furthers the potential of the NPU by providing a suite of tools focused on neural network optimization, supporting developers in tuning their AI models with fine precision. Optimized for automotive-grade applications, aiWare's technology ensures seamless integration into systems requiring AEC-Q100 Grade 2 compliance, significantly enhancing the capabilities of automated driving applications from L2 through L4.

aiMotive
AI Processor, Building Blocks, CPU, Cryptography Cores, FlexRay, Platform Security, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

Polar ID Biometric Security System

The Polar ID system by Metalenz revolutionizes biometric security through its unique use of meta-optic technology. It captures the polarization signature of a human face, delivering a new level of security that can detect sophisticated 3D masks. Unlike traditional structured light technologies, which rely on complex dot-pattern projectors, Polar ID simplifies the module through a single, low-profile polarization camera that operates in near-infrared, ensuring functionality across varied lighting conditions and environments. Polar ID offers ultra-secure facial authentication capable of operating in both daylight and darkness, accommodating obstacles such as sunglasses and masks. This capability makes it particularly effective for smartphones and other consumer electronics, providing a more reliable and secure alternative to existing fingerprint and visual recognition technologies. By integrating smoothly into the most challenging smartphone designs, Polar ID minimizes the typical hardware footprint, making advanced biometric security accessible at a lower cost. This one-of-a-kind technology not only enhances digital security but also provides seamless user experiences by negating the need for multiple optical components. Its high resolution and accuracy ensure that performance is not compromised, safeguarding user authentication in real-time, even in adverse conditions. By advancing face unlock solutions, Polar ID stands as a future-ready answer to the rising demand for unobtrusive digital security in mainstream devices.

Metalenz Inc.
13 Categories
View Details

PUFrt

PUFrt stands as a flagship hardware root of trust solution, incorporating PUF technology to create a unique and unclonable UID directly on the chip. This ensures robust security from the ground up, offering features such as TRNG, secure OTP, and an attack-resistant shell. The architecture of PUFrt provides a resilient foundation for semiconductor devices, helping to mitigate reverse engineering and counterfeiting risks. It integrates seamlessly with various systems, offering a trusted base for lightweight hardware security keys and full-function security coprocessors.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AES-XTS for Encryption of Storage Devices

Designed for secure disk encryption, Helion's AES-XTS cores leverage the robust AES-XTS algorithm, providing superior security at the sector level. By utilizing tweakable block ciphers, these cores enhance security against threats such as copy-and-paste attacks, while allowing for concurrent processing to boost performance. The AES-XTS core supports data rates exceeding 64Gbps, making it suitable for high-performance storage applications including disk encryption for enterprise servers. It can be configured to operate with dual keys (128-bit and 256-bit) and optionally support features like Ciphertext Stealing, ensuring versatility and robustness in varying storage environments. With specific designs targeting FPGAs and ASICs, Helion's AES-XTS solutions are optimized for the highest efficiency, minimizing logic area usage. These cores are crucial for organizations requiring reliable data encryption for storage media, such as hard drives and solid-state drives, where data protection is paramount.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details

eSi-Crypto

The eSi-Crypto suite provides a comprehensive range of encryption and authentication functionalities catered for integration in both ASIC and FPGA targets. Designed with efficiency in mind, it offers low resource usage coupled with high throughput. This suite incorporates a high-grade True Random Number Generator (TRNG) compliant with NIST 800-22 standards. Available with standalone or AMBA APB/AHB/AXI bus interfaces, it supports a wide range of cryptographic algorithms such as CRYSTALS Kyber, Dilithium, ECDSA, RSA, AES, and SHA, providing robust security solutions adaptable to varying application needs.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

L5-Direct GNSS Receiver

The L5-Direct GNSS Receiver from oneNav, Inc. is a revolutionary product designed to engage directly with L5-band signals, a step away from the reliance on older L1 signals. This GNSS receiver captures signals directly in the L5-band, providing a superior solution that addresses the growing issue of GPS signal jamming, creating significant value for users including defense agencies and OEMs. It boasts unique features such as multi-constellation support, which allows users to access over 70 satellite signals from major constellations like GPS, Galileo, QZSS, and BeiDou. The L5-Direct technology integrates a single RF chain, simplifying design and improving efficiency, making it ideal for applications where space and cost are critical. The technology employs machine learning algorithms to mitigate multipath errors, an innovative approach that elevates accuracy by differentiating between direct and reflected signals in challenging terrains. This level of precision and independence from legacy signals captures the essence of what oneNav stands for. Additionally, the receiver's power efficiency is unmatched, thanks to the Application Specific Array Processor (ASAP), which manages processing speed to conserve energy. Its design is particularly advantageous for wearables, IoT devices, and systems requiring constant location tracking, ensuring a minimal power footprint while delivering consistent, accurate data. The L5-Direct GNSS Receiver is also built to withstand disruptions, with significant resilience to jamming and improved consistency in GPS-challenged environments.

oneNav, Inc.
GLOBALFOUNDRIES
22nm FDX
ADPCM, AI Processor, Bluetooth, CAN, GPS, Processor Core Independent, Security Protocol Accelerators, Wireless Processor
View Details

HDCP Encryption-Decryption Engine

Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

AES-GCM for Authenticated Encryption

AES-GCM cores by Helion stand as a high-performance solution, offering both encryption and authentication within a single, efficient framework. The Galois Counter Mode (GCM) is particularly well-suited for high-speed applications due to its pipeline compatibility and parallel processing capabilities. This makes it ideal for modern networking protocols demanding swift data processing and high security. Helion AES-GCM supports data rates ranging from below 50Mbps to over 40Gbps, ensuring they cater to both low and high bandwidth requirements. Its adaptability across different FPGA and ASIC technologies guarantees optimized performance tailored to client-specific needs, with options for ultra-compact implementations when space and power are of concern. This core is heavily utilized in data transmission where data integrity and privacy must be maintained without the typical throughput sacrifices inherent to traditional encryption methods. Its deployment in MACsec, IPsec, and other security protocols underscore its integral role in maintaining data security across various sectors.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

QUIC Protocol Core

QUIC Protocol Core is engineered to handle high-speed data transmission efficiently, making it suitable for environments prone to network congestion and packet loss. By eschewing traditional TCP/IP methods, this core delivers up to 400 times the performance improvement, ensuring data transfers are both secure and swift. The core is particularly adept in FPGA environments, offering low memory footprint and high data processing capabilities. It provides the essential high-level security via integrated TLS 1.3, supporting robust encryption throughout its operation.

Design Gateway Co., Ltd.
AI Processor, ATM / Utopia, Cryptography Cores, Error Correction/Detection, Ethernet, RapidIO, Security Protocol Accelerators, USB
View Details

JPEG-LS Encoder

The JPEG-LS Encoder core from Parretto is designed to provide superior lossless image compression, compliant with the JPEG-LS standard, known for its efficacy in reducing data without compromising image integrity. Adhering to the ISO/IEC 14495-1 and ITU-T Rec. T.87 specifications, this encoder surpasses JPEG-2000 in many cases due to its minimal resource requirements and negligible latency. It delivers remarkable compression performance for images with sample depths ranging from 8 to 16 bits, and operates with less than one line of encoding latency, eliminating the need for external memory. The core is capable of processing one pixel per clock cycle and offers configurable output data word widths to tailor to specific image processing tasks. This encoder ensures seamless data flow with its pixel and FIFO data interfaces, or alternatively, through an Avalon Streaming interface equipped with back-pressure support. It is suitable for high-resolution image processing up to ultra-high-definition levels, making it a flexible and effective solution for a wide range of imaging applications.

Parretto B.V.
Image Conversion, JPEG, JPEG 2000, Security Protocol Accelerators
View Details

AES (standard modes) for Secure Encryption

Helion offers comprehensive AES encryption cores, a staple in data security due to its robustness and efficiency. These cores support the AES standard, chosen by NIST for its advanced security features. AES operates as a block cipher with three key size options (128, 192, 256 bits), allowing flexibility in security levels. Ideal for commercial applications, AES ensures data integrity and confidentiality, vital for secure communications and data storage. Helion's AES solutions are distinguished by their scalability and adaptability, making them suitable for various technological implementations. Whether for ASICs or FPGAs, these cores are designed to maximize performance without compromising core area efficiency. With a focus on low power consumption and high data throughput, Helion's AES cores are versatile tools for secure encryption tasks. Moreover, Helion's AES IPs incorporate several modes, including CBC, CFB, OFB, and CTR, to further enhance security for numerous applications ranging from wireless communications to disk encryption. With a commitment to excellence, Helion maintains its standing as a leader in encryption core technology, continually advancing their offerings to meet evolving security demands.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Other, Security Protocol Accelerators
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

Secure Protocol Engines

Secure Protocol Engines are high-performance IP blocks that focus on enhancing network and security processing capabilities in data centers. Designed to support secure communications, these engines provide fast SSL/TLS handshakes, MACsec and IPsec processing, ensuring secure data transmission across networks. They are particularly useful for offloading intensive tasks from central processing units, thereby improving overall system performance and efficiency. These engines cater to data centers and enterprises that demand high throughput and robust security measures.

Secure-IC
AMBA AHB / APB/ AXI, CXL, DSP Core, Embedded Security Modules, Error Correction/Detection, Ethernet, I2C, IEEE1588, PCI, RapidIO, Security Protocol Accelerators, USB, V-by-One
View Details

QDID PUF

The QDID PUF uses quantum tunneling via variations in the oxide layer of a CMOS process, creating a unique identity for devices. It eliminates the complexities and costs of traditional secure provisioning by generating high entropy keys on-demand from intrinsic quantum phenomena. This hardware-anchored identity solution excels in resisting side-channel attacks and offers compliance with standards like PSA Level 2 and CC EAL4+. Extensive environmental testing ensures durability, making it ideal for applications including secure key generation and device authentication.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
12nm LP/LP+, 16nm FFC/FF+, 55nm ULP
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

i.MX RT700 Crossover MCU

The i.MX RT700 Crossover MCU is a powerful preproduction microcontroller designed for AI-enabled edge devices. It harnesses the strength of five computing cores, making it exceptionally well-suited for high-compute tasks and applications requiring significant processing power in compact, efficient designs. This MCU integrates robust security features, ensuring that intelligent edge applications maintain integrity and resilience against potential threats. Its architecture supports diverse functionalities, from real-time processing to advanced signal handling, facilitating a seamless frontier for developing complex, responsive systems. The versatility of the i.MX RT700 makes it ideal for a range of applications, from automotive edge computing environments to smart consumer electronics. Its advanced processing power and flexible architectural design allow developers to push the limits of innovation, delivering smarter solutions with rapid response capabilities.

NXP Semiconductors
2D / 3D, AI Processor, CPU, IoT Processor, Microcontroller, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

Digital Systems and Security Solutions

Digital Systems and Security Solutions from VeriSyno Microelectronics deliver a suite of advanced digital IP and security technologies. These systems include security modules and perform functions crucial for protecting data integrity and privacy in integrated circuits. By leveraging digital IP technology, VeriSyno is capable of delivering high-efficiency solutions pertinent to secure communications and data handling within devices. These solutions feature advanced cryptographic capabilities and platform security technologies that safeguard not only the data but access points across a variety of implementations. Its offerings are indispensable for industries focusing on data-driven applications requiring assurance against breaches and unauthorized access. Further enhancements in digital processing are facilitated through these IPs, which include cutting-edge logic synthesis and process technologies tailored to meet rigorous security standards. They serve as essential components in digital transformation, reflecting VeriSyno’s commitment to advancing secure and efficient electronic systems.

VeriSyno Microelectronics Co., Ltd.
TSMC
28nm, 65nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Suite-Q HW

Suite-Q HW is a comprehensive system-on-chip (SoC) design that encapsulates all necessary standardized cryptographic protocols required for secure communication. PQ Secure has engineered this hardware solution to cater to both high-end servers and low-end embedded systems, providing a flexible platform that adapts to various operational requirements. This product achieves performance efficiency by offloading symmetric and asymmetric cryptographic operations to specialized hardware accelerators, effectively reducing the computational burden on the central processor. Suite-Q HW supports a range of cryptographic functions, from Advanced Encryption Standard (AES) implementations to complex public-key cryptographic standards such as ECDSA and lattice-based cryptography. A prominent feature of Suite-Q HW is its capability to incorporate optional differential power analysis (DPA) countermeasures, which secure cryptographic operations against side-channel attacks. Furthermore, the design of Suite-Q HW facilitates ease of integration with various SoC and FPGA architectures, making it a highly adaptable solution for developers seeking to enhance their security infrastructure without substantial redesign efforts.

PQ Secure Technologies, LLC
11 Categories
View Details

FortiCrypt

FortiCrypt is designed to address side-channel and fault injection vulnerabilities, providing strong protection for cryptographic implementations. Its architecture uses a combination of patented techniques to deliver robust security without impacting performance or power efficiency, making it suitable for both high-performance and power-sensitive applications.

FortifyIQ
GLOBALFOUNDRIES, TSMC
20nm, 28nm
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

NeoPUF

NeoPUF is a cutting-edge hardware solution that revolutionizes semiconductor security through its advanced random number generation capabilities. It offers up to 100 times faster performance compared to traditional methods, positioning it as an essential component for the next generation of secure chips. The technology is rooted in the concept of Physical Unclonable Functions (PUFs), which inherently provide unique identifiers to each chip, ensuring unforgeable security features. NeoPUF offers a robust foundation for securing semiconductors throughout their lifecycle, addressing vulnerabilities in data at rest, in transit, and during processing. Its design leverages both analog and digital components to achieve unmatched security and reliability, creating a formidable 'drop-in' security module solution. With applications spanning a variety of industries, including automotive, IoT, and mobile computing, NeoPUF enables these sectors to enhance device integrity, combat counterfeiting, and secure sensitive information. The technology's integration into semiconductor design eliminates the need for costly and complex key management processes, thus streamlining the production and operation phases. Additionally, NeoPUF's adaptability to future computing demands, such as those posed by quantum advances, further cements its place as a versatile and forward-thinking security solution.

eMemory Technology Inc.
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

PUFhsm is an advanced embedded hardware security module designed for automotive and complex applications. It acts as an embedded security enclave, isolating key functions from the main system to ensure secure operations. With integrated cryptographic engines and dedicated CPUs, PUFhsm supports secure boot, updates, and key management within a compliant framework. It enhances designs by bolstering security while optimizing efficiency and reducing time-to-market.

PUFsecurity
Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

FortiPKA-RISC-V

The FortiPKA-RISC-V is a unique public key accelerator that incorporates modular multiplication resistant to both side-channel and fault injection threats. It serves as an efficient coprocessor for RISC-V architectures, enabling secure and quick cryptographic operations while offering a streamlined performance across low-power device applications.

FortifyIQ
GLOBALFOUNDRIES, UMC
16nm FFC/FF+, 500nm
11 Categories
View Details

CANsec Controller Core

The CANsec Controller Core offers a secure and robust solution for Controller Area Network (CAN) communications. Built with advanced security protocols, it ensures the protection of data within automotive systems. This core supports both traditional and new-generation CAN and CAN FD protocols, providing flexibility and enhanced functionality in vehicle networks. Designed to meet stringent automotive safety standards, the controller core integrates seamlessly with existing systems, adding an additional layer of security. Engineers can easily implement this solution to guard against malicious intrusions and data tampering, ensuring reliable communication paths in automotive environments. Its architecture supports high-speed data processing while maintaining low power usage, vital for modern applications that demand efficiency and reliability. Automotive developers will find this core an invaluable asset in creating secure, interconnected vehicle systems.

Fraunhofer Institute for Photonic Microsystems (IPMS)
CAN, CAN XL, CAN-FD, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Temperature Sensor
View Details

PUFcc

PUFcc is an all-encompassing Crypto Coprocessor that delivers key generation, storage, and complete crypto operations in one solution. It builds on the PUFrt's hardware root of trust, offering secure boot, OTA updates, TLS, and key management. Its comprehensive design includes NIST-certified cryptographic algorithms, customizable for a wide range of IoT applications. PUFcc simplifies SoC design with standardized control interfaces and secure memory access, enhancing system security effortlessly.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

PhantomBlu - Tactical Communications

PhantomBlu represents Blu Wireless's state-of-the-art mmWave technology tailored for military and defense use. This advanced solution supports tactical communication between vehicles, whether on land, sea, or air, by leveraging a stealthy mesh network capable of running applications and IP networking over an anti-jam resistant infrastructure. The PhantomBlu network offers flexibility and scalability to meet various operational demands within defense environments, from securing critical infrastructure to enabling convoy communications and integrating airborne systems. Its ability to provide high bandwidth in real-time ensures communication is reliable and secure, even in complex and hostile environments. With features like 10x data rates compared to Wi-Fi and 5G, reduced size, weight, and power requirements, and future-proof scalability, PhantomBlu is built for seamless integration with existing military systems. The solution further offers long-range communication up to 4km, incorporating advanced features like antenna beamforming for improved signal processing, making it a robust component for military networks.

Blu Wireless Technology Ltd.
23 Categories
View Details

Post-Quantum Cryptography IP

Post-Quantum Cryptography IP offers a hardware-based solution integrated with software capabilities to ensure secure communications in a quantum computing era. Designed with quantum resistance in mind, it supports key exchange, encapsulation, and decapsulation functions using lattice-based algorithms. This IP is equipped with measures to protect against side-channel attacks, including simple power analysis and differential power analysis. Offering interfaces like AMBA, it ensures flexibility in integration within various systems, positioning it as a crucial component for future-proofing communication security against the impending challenges of quantum computation.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine offers a robust hardware acceleration solution for cryptographic hashing functions. Its design prioritizes high throughput and efficient resource utilization, complying with NIST’s FIPS 202 standards. The core supports various SHA-3 hash functions including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, alongside Extendable Output Functions (XOF) like SHAKE-128 and SHAKE-256. This comprehensive support makes it a versatile tool for ensuring data integrity and authentication in a multitude of applications. A key feature of the SHA-3 Crypto Engine is its protection against timing-based side channel attacks, offering a secure cryptographic environment. Fully synchronous in design, it operates within a single clock domain, ensuring stability and reliability across different platforms. Its applications span various domains such as secure boot engines, IPsec and TLS/SSL protocol engines, and even blockchain technologies. The core has been extensively verified and includes features such as automatic byte padding, making it an adaptable solution across a wide range of applications. It’s designed to be implemented on both FPGAs and ASICs, ensuring flexibility and adaptability in various deployment scenarios.

KiviCore
2D / 3D, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Cryptographic Core

The Cryptographic Core is a robust and integral component of PQ Secure's product line, designed to address the need for efficient and effective cryptographic operations across various platforms. This solution is highly configurable and provides comprehensive support for both symmetric and asymmetric cryptographic functions. It is particularly adept at handling complex cryptographic algorithms such as elliptic curve cryptography and other post-quantum algorithms, ensuring data integrity and security. This core is particularly valuable for applications requiring high levels of security without compromising on performance. By incorporating advanced cryptographic techniques, it can operate efficiently on a range of devices, from embedded systems to high-performance computing environments. It is designed to be scalable, allowing integration into a variety of hardware and software architectures to support a wide range of applications. Notably, the Cryptographic Core offers enhanced protection measures against side-channel attacks, providing an additional layer of security for sensitive information. By leveraging this core, developers and engineers can offload intensive cryptographic operations, thereby enhancing the overall performance of their systems while ensuring robust data protection. The flexibility and reliability of this core make it an ideal choice for industries looking to safeguard data against emerging threats.

PQ Secure Technologies, LLC
AI Processor, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators, Standard cell
View Details

MACSec

CoMira Solutions offers a Media Access Control Security (MACSec) solution adhering to IEEE standards aimed at safeguarding communication within 802.1 LAN environments. MACSec ensures data confidentiality and integrity, preventing unauthorized access and disruptions. It employs advanced encryption standards and supports flexible traffic management through various port configurations. The MACSec IP's time-division multiplexed architecture aligns seamlessly with CoMira's UMAC, ensuring synchronous operation despite differing link speeds. This implementation includes FIPS-compliant encryption methods such as GCM-AES-128 and GCM-AES-256, supporting robust security needs. Furthermore, CoMira's MACSec supports multiple secure channels and security associations per port, adding layers of protection to client systems. The configurability of Secure Channels and the ability to strip security tags enhances its adaptability in varied networking scenarios, reflecting CoMira's commitment to delivering tailor-fit security solutions.

CoMira Solutions
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Video Anonymization

The Video Anonymization solution by Gyrus AI is designed to meet regulatory compliance mandates like GDPR by ensuring the privacy of individuals captured in videos. By using advanced AI techniques, it automatically detects and blurs faces, license plates, and other sensitive information in video footage. This tool not only complies with global data privacy laws but also maintains video quality, allowing businesses to handle, process, and share video content securely and ethically. One of the standout features of this solution is its ability to replace real faces with AI-generated synthetic characters. This means that identity protection is assured without losing critical non-identifying attributes, making it exceptionally suitable for industries such as automotive, healthcare, and media. The system's automated nature means that it can handle large datasets efficiently, up to 10 times more than conventional methods, and at a significantly reduced cost, often lowering expenses by up to 70%. The solution integrates seamlessly into existing workflows, thanks to its high degree of customization and compliance with various industry standards. Whether used in real-time or batch processing, its superior anonymization capabilities outperform traditional methods, enhancing privacy levels while facilitating post-processing analytics like emotion tracking and gaze detection. Gyrus AI’s tool empowers organizations to meet privacy standards effectively, thereby facilitating secure media sharing and analysis.

Gyrus AI
AV1, Embedded Security Modules, Platform Security, Receiver/Transmitter, Security Protocol Accelerators, Sensor, VESA
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module by CrossBar addresses the growing need for secure and tamper-resistant key management in the fast-evolving crypto industry. This module offers unprecedented protection and seamless integration, presenting a robust platform for securely managing digital assets and executing cryptographic operations. Emphasizing decentralization and self-sovereignty, Cramium PHSM integrates micro-controllers with secure elements, delivering best-in-class security that caters to the diverse needs of modern digital transactions. This module safeguards private keys with unmatched resistance against physical and logical attacks, positioning itself as a key component in building trust in digital ecosystems. Designed to meet the demanding standards of the crypto landscape, Cramium PHSM's performance and reliability enable seamless deployment across various devices and applications. Its built-in architectural features support adaptability and scalability, ensuring it can address emerging security challenges effectively while maintaining flexibility across platforms.

CrossBar Inc.
Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

OTP Technology

OTP (One-Time Programmable) technology from Chuangfeixin provides an innovative approach to data security and protection within embedded applications. Upon programming, the data is immutable, ensuring hardware integrity and safeguarding products against unauthorized access. This IP is vital across sectors requiring assured reliability and data confidentiality, such as FLASH storage, CPUs, and MCUs. The OTP Technology integrates easily with CMOS processing steps, requiring no additional tooling conditions, thus simplifying manufacturing while reducing costs associated with production. It is designed to protect the product design from exploitation through a robust anti-tampering structure. Its small IP core footprint and high reliability enhance its value proposition, enabling its broad application in embedded security. Chuangfeixin's OTP Technology is verified across various process nodes, promising longevity and efficacy of over a hundred years of data storage at extreme temperatures. This capability encapsulates its utility in advanced processor environments where security and data integrity are non-negotiable.

Chuangfeixin Technologies
Embedded Memories, Embedded Security Modules, Security Protocol Accelerators, Standard cell
View Details

MACsec

Comcores' MACsec solution addresses the needs for secure communication on Ethernet links by implementing the IEEE 802.1AE standard for MAC Security. It provides comprehensive protection against eavesdropping and manipulation, making it suitable for applications demanding high security over public and private networks. Built to support various data rates, the MACsec IP core integrates robust cryptographic suites like AES-GCM to encrypt and authenticate network traffic. Its deployment ensures data confidentiality and integrity, fostering a secure environment for transmitting sensitive information such as in military communication systems and data centers.

Comcores
Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Security Protocol Accelerator

The Security Protocol Accelerator from PQ Secure Technologies enhances the computational efficiency of cryptographic operations by accelerating the execution of security protocols on hardware platforms. This innovative solution is meticulously designed to optimize the processing of cryptographic algorithms, thereby reducing the computational load on host processors. By integrating the Security Protocol Accelerator, systems benefit from a significant boost in performance, particularly when handling large volumes of cryptographic data. This makes it an excellent fit for applications that demand real-time processing capabilities, such as network security appliances and high-performance servers. The accelerator provides streamlined execution pathways for both symmetric and asymmetric encryption operations, ensuring rapid and secure data exchanges. Another key feature of this product is its flexibility to integrate with existing systems, making it a versatile solution across a wide range of industries and applications. By offloading demanding cryptographic tasks, it not only enhances the throughput of digital systems but also improves the overall security posture by implementing hardware-based security measures. This approach ensures that sensitive operations are conducted swiftly and securely, safeguarding against potential cyber threats.

PQ Secure Technologies, LLC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Keccak Hash Engine

The Keccak Hash Engine is a versatile IP core known for its role in guaranteeing data security through a variety of cryptographic operations. This core is not just limited to hashing functions but extends its capabilities to include authentication, encryption, and pseudo-random number generation. Fundamental to its design is the use of the sponge construction and the innovative Keccak-f cryptographic permutation. This IP core stands out for its flexibility, allowing for customization in hash output lengths and security levels. Standardized under widely recognized protocols like NIST's FIPS 202, the Keccak Hash Engine has undergone thorough scrutiny ensuring its robustness. The design is optimized for seamless integration into existing systems, operating efficiently within a single clock domain. The Keccak Hash Engine’s applications extend across various sectors, providing essential security functions for systems like blockchain, PRNG, and more. Its configurability means it can adapt to numerous scenarios, maintaining high security standards as required by different applications.

KiviCore
2D / 3D, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Security Protocol Accelerators

These accelerator modules are designed for secure, high-speed data processing, supporting various cryptographic protocols essential for safe and efficient data exchange. They serve a critical role in safeguarding communications in sectors like automotive and IoT.

Synopsys, Inc.
Content Protection Software, Cryptography Cores, Security Protocol Accelerators
View Details

Side-channel Attack Resistance

This IP core is designed to mitigate the risks associated with side-channel attacks, offering circuit-level enhancements to prevent data leakage from power and electromagnetic emissions. It integrates seamlessly with existing architectures, providing an additional layer of security without compromising processing power or speed.

FortifyIQ
Intel Foundry, TSMC
7nm, 65nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Stellar Packet Classification Platform

The Stellar Packet Classification Platform offers an advanced solution for complex packet processing and network management by leveraging cutting-edge classification techniques. Designed to efficiently handle ultra-high search performance, Stellar excels in implementing comprehensive Access Control List (ACL) rules and Longest Prefix Match (LPM) methods. This sophisticated IP is capable of executing hundreds of millions of lookups per second, ensuring seamless processing within demanding networking environments. Ideally suited for high-reliability systems such as 5G User Plane Function (UPF) and network firewalls, Stellar provides robust security measures against threats like Distributed Denial of Service (DDoS) attacks. With capabilities extending from IPV4/6 address lookups to real-time routing, Stellar effectively supports extensive application bandwidths and complex rule integrations. Live updates ensure that the platform remains responsive to dynamic network scenarios, maintaining optimal system performance and integrity.

Peraso Inc.
11 Categories
View Details

ReRAM Secure Keys

The ReRAM Secure Keys from CrossBar serve as a cornerstone in bolstering the security framework of semiconductor devices by embedding secure keys within the hardware. These secure key solutions leverage CrossBar's innovative ReRAM technology to deliver exceptional protection against tampering and unauthorized access. Incorporating ReRAM Secure Keys into a semiconductor not only fortifies device security but also enhances the overall integrity of the system by ensuring that cryptographic operations are conducted securely and effectively. The ReRAM technology provides a platform for creating physical unclonable functions (PUF) that are essential to protecting sensitive data in an ever-evolving threat landscape. The adaptability of ReRAM Secure Keys across different platforms and use cases allows for their deployment in a variety of environments requiring stringent security measures, such as in IoT devices, secure communication systems, and financial transaction platforms. By offering a tamper-resistant solution, CrossBar strengthens the confidence in digital transactions and communications across sectors.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details

Low Power Security Engine

The Low Power Security Engine is designed by Low Power Futures to provide robust security for IoT devices while maintaining minimal power usage. Focusing on compact and comprehensive security capabilities, it supports elliptic-curve based cryptographic algorithms, including ECDHE (Elliptic-Curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm). The design is perfect for ensuring secure operations in constrained environments like RFID systems and embedded SIM cards, offering side-channel and timing attack resistance, thus securing sensitive data in demanding applications like IIoT and connected infrastructure.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Root of Trust

Rambus' Root of Trust is a foundational technology for securing system on chip (SoC) hardware and safeguarding data at rest. This solution caters to government and automotive sectors, featuring programmable secure co-processors and highly compact designs with options for Quantum Safe Cryptography. Available with certifications for FIPS 140 CMVP and ISO 26262, it is vital for applications requiring stringent security measures.

Rambus
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiMac

The FortiMac library provides advanced protection for HMAC SHA2 implementations, ensuring resilience against differential power analysis (DPA) and fault injection. It is designed for situations requiring high-security cryptographic computations without sacrificing efficiency, particularly in environments where power and area are constrained.

FortifyIQ
Samsung, TSMC
7nm LPP, 28nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

100 Gbps Polar Encoder and Decoder

This advanced Polar Encoder and Decoder IP offers high-speed encoding and decoding capabilities, reaching up to 100 Gbps. It's tailored for next-generation communication systems that require efficient data processing without compromising speed. The use of Polar coding, known for its capacity-achieving properties, provides superior error correction compared to other coding techniques. The IP supports a variety of modern communication protocols and is designed to be implemented on high-performance FPGA platforms. Its ability to handle large amounts of data quickly makes it ideal for use in data centers, high-speed networks, and telecommunications infrastructure seeking to enhance data throughput and reliability. This encoder and decoder solution not only improves data throughput but also ensures data integrity through advanced error correction mechanisms, thereby enhancing overall network performance and reliability. Its robustness and efficiency make it a critical component in any high-speed data transmission system.

IPrium LLC
AI Processor, Content Protection Software, Cryptography Cores, Error Correction/Detection, Receiver/Transmitter, Security Protocol Accelerators
View Details

Quantum Safe Cryptography

Featuring solutions designed to withstand quantum computer threats, Rambus' Quantum Safe Cryptography IP uses advanced algorithms selected by NIST and CNSA. These include options for integrating Quantum Safe Root of Trust and standalone Quantum Safe Engines, enabling the protection of both hardware and data against future quantum attacks, ensuring long-term security resilience.

Rambus
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

CCSDS LDPC (8160, 7136)

The CCSDS LDPC (8160, 7136) IP is a meticulously crafted Low-Density Parity-Check encoder and decoder tailored for space communication standards. The Consultative Committee for Space Data Systems (CCSDS) has specified these LDPC codes to enhance data integrity and reliability for space missions where error-free transmission is crucial. This IP core offers significant improvements in error correction performance, making it ideal for deep space and near-Earth missions requiring high data throughput and reliability. The use of LDPC coding provides a significant advantage over traditional error correction methods, enabling efficient data recovery even under challenging conditions. Designed for FPGA implementation, the IP can be seamlessly integrated into space communication systems, offering reliable performance and ensuring compliance with CCSDS standards. Its efficient use of resources makes it a preferred choice for space agencies looking to maximize mission success.

IPrium LLC
Cryptography Cores, Embedded Security Modules, Error Correction/Detection, Platform Security, Receiver/Transmitter, Security Protocol Accelerators
View Details

KiviPQC-KEM

The KiviPQC-KEM is a post-quantum cryptographic IP core designed for the future of secure communications. It implements the ML-KEM Key Encapsulation Mechanism, which is a robust algorithm resistant to quantum computing attacks. This IP core is capable of executing key generation, encapsulation, and decapsulation operations as per the NIST FIPS 203 standard. Highly efficient in performance, the KiviPQC-KEM operates with minimal logic utilization making it cost-effective for clients. It offers high-level security by providing hardware acceleration for computationally demanding tasks, minimizing vulnerabilities and ensuring maximum protection in communications. Ideal for applications that prioritize quantum-resistance, the KiviPQC-KEM is suitable for securing network infrastructures, transport protocols like TLS and SSL, and electronic transactions. The architecture facilitates easy integration into a wide range of platforms, supporting both FPGA and ASIC implementations.

KiviCore
TSMC
10nm, 16nm, 28nm
2D / 3D, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

Agile Secure Element

The Agile Secure Element IP is a customizable security enclave, integrating secure boot, key storage, and trusted execution into SoCs. It features crypto-accelerated engines for secure operations and a secure microprocessor, which can include a RISC-V core for isolation of critical processes. Designed to meet regulatory standards, it offers flexibility in integrating secure elements without custom development, facilitating rapid design of secure devices across various industries such as automotive and medical.

Crypto Quantique
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QRoot Lite

QRoot Lite is a flexible and lightweight root-of-trust designed for microcontrollers and IoT devices, especially those constrained by power and space. Following the TCG MARS specification, it introduces essential security features such as secure boot, attestation, and key protection. This IP minimizes costs and simplifies integration, aiding teams aiming for regulatory compliance and robustness in products that include smart sensors and medical devices. Its architecture is secured against counterfeiting and tampering, offering future-proof security with cryptographic agility.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt