Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Security Subsystems

Advanced Security Subsystems Semiconductor IP

In the world of integrated circuits, Security Subsystems Semiconductor IPs play a vital role in ensuring the confidentiality, integrity, and authenticity of data. These subsystems are meticulously designed to be incorporated into larger systems, providing robust security features crucial for combating the ever-evolving cyber threats. They are essential for a wide array of applications, including IoT devices, automotive systems, and consumer electronics, which demand stringent security measures.

Security subsystems often include components such as encryption and decryption engines, secure boot mechanisms, key management systems, and hardware-based random number generators. These components work in harmony to secure data transactions and storage within an electronic device. By integrating such advanced security features directly into the silicon, device manufacturers can significantly enhance the overall security posture of their products.

Furthermore, these security IPs are not only about protecting sensitive data but also about ensuring device integrity. Features such as tamper detection, secure firmware update, and access control play critical roles in preventing unauthorized access and modifications. This is particularly important in sectors like automotive, where safety and privacy are paramount, and IoT, where devices are often part of a broader network and are susceptible to remote attacks.

Products in the Security Subsystems category offer versatile and scalable solutions that cater to varying security requirements. They are designed to address specific needs, whether it's for securing a smartphone, enabling safe digital payment services, or protecting a vehicle's communication protocols. By choosing the right security subsystem semiconductor IP, developers can build products that not only perform efficiently but also comply with the highest security standards in today's connected world.

All semiconductor IP
43
IPs available

Polar ID Biometric Security System

The Polar ID Biometric Security System by Metalenz revolutionizes smartphone biometric security with its advanced imaging capabilities that capture the full polarization state of light. This system detects unique facial polarization signatures, enabling high-precision face authentication that even sophisticated 3D masks cannot deceive. Unlike traditional systems requiring multiple optical modules, Polar ID achieves secure recognition with a single image, ideal for secure digital payments and more. Operating efficiently across various lighting conditions, from bright daylight to complete darkness, Polar ID ensures robust security without compromising user convenience. By leveraging meta-optic technology, it offers a compact, cost-effective alternative to structured light solutions, suitable for widespread deployment across millions of mobile devices.

Metalenz Inc.
13 Categories
View Details

PUFrt

PUFrt is a sophisticated Hardware Root of Trust (HRoT) solution that focuses on generating and storing root keys that never leave the chip, ensuring a secure environment for sensitive operations. This IP incorporates a 1024-bit Physical Unclonable Function (PUF) along with a true random number generator (TRNG) compliant with NIST standards. PUFrt's architecture is fortified with secure storage capabilities that protect key information from potential physical attacks, providing a robust security layer against future threats in the IoT landscape. Its design allows seamless integration across different systems and design architectures, making it versatile for applications ranging from lightweight hardware security keys to full-fledged Security Coprocessors. With built-in anti-tamper features and customization options, PUFrt is a prime choice for those looking to secure their semiconductor supply chain against threats like counterfeiting and reverse engineering. Certified by Riscure, PUFrt sets a high benchmark for reliable security practices in semiconductor design. Its comprehensive security framework makes it indispensable for modern chip designs that necessitate high levels of trust and integrity.

PUFsecurity
Samsung, TSMC
4nm, 5nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SiFive Intelligence X280

The Intelligence X280 is engineered to provide extensive capabilities for artificial intelligence and machine learning applications, emphasizing a software-first design approach. This high-performance processor supports vector and matrix computations, making it adept at handling the demanding workloads typical in AI-driven environments. With an extensive ALU and integrated VFPU capabilities, the X280 delivers superior data processing power. Capable of supporting complex AI tasks, the X280 processor leverages SiFive's advanced vector architecture to allow for high-speed data manipulation and precision. The core supports extensive vector lengths and offers compatibility with various machine learning frameworks, facilitating seamless deployment in both embedded and edge AI applications. The Intelligence family, represented by the X280, offers solutions that are not only scalable but are customizable to particular workload specifications. With high-bandwidth interfaces for connecting custom engines, this processor is built to evolve alongside AI's progressive requirements, ensuring relevance in rapidly changing technology landscapes.

SiFive, Inc.
AI Processor, CPU, Cryptography Cores, IoT Processor, Multiprocessor / DSP, Processor Core Dependent, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

Secure OTP

Secure OTP is a cutting-edge non-volatile memory solution designed to safeguard key, data, and secret storage with enhanced protection against hardware attacks. It features a combination of physical macros and digital RTL, offering robust anti-tamper and integrated protection mechanisms. This solution is specifically architected for integration in CMOS technologies and is compatible across numerous IC and ASIC applications. By incorporating a 1024-bit PUF for scrambling and I/O shuffling, Secure OTP significantly elevates stored data security, effectively making it tamperproof. As digital security challenges mount, Secure OTP provides a modernized answer, ensuring the safekeeping of critical information across its lifecycle. Its adoption addresses prevalent security gaps in legacy e-fuse solutions and is instrumental in extending robust defense systems within SoC environments, acting as a cornerstone for comprehensive hardware security strategies.

PUFsecurity
Cryptography Cores, Embedded Memories, Embedded Security Modules, Flash Controller, Platform Security, Security Subsystems, SRAM Controller, Standard cell
View Details

eSi-Crypto

The eSi-Crypto solution provides an advanced encryption and authentication framework, ensuring robust security for digital data. Its sophisticated algorithms cover a wide array of cryptographic needs, from basic encryption to complex data protection mechanisms. This solution is designed to offer high performance with low resource consumption, making it ideal for various embedded systems where security and efficiency are paramount. EnSilica has integrated various cryptographic components, including True Random Number Generators (TRNGs), to support extensive security protocols. These components are critical in applications such as secure communications, financial transactions, and personal data protection, where unauthorized access prevention is crucial. The streamlined architecture of eSi-Crypto ensures it can be efficiently implemented across diverse system architectures, offering scalable security solutions for emerging digital threats. Its flexibility allows customization and integration with other IPs, providing a seamless security shield for both legacy and new systems.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Flash Protection Series

The Flash Protection Series is a sophisticated suite of security solutions designed to extend the secure boundaries of SoC architectures into flash storage realms. By utilizing PUF technology, this series offers three primary solutions: PUFef for embedded flash, PUFenc for external NAND flash, and PUFxip for external NOR flash. Each solution provides unique protection capabilities such as encryption, real-time decryption, and execution to maintain data integrity and confidentiality. With these protections in place, SoCs achieve a higher level of security, preventing unauthorized access and ensuring that sensitive data remains protected throughout its lifecycle. This series is compatible with a wide range of foundries, making it a flexible choice for designers aiming to implement robust security measures without compromising on performance or compatibility.

PUFsecurity
Embedded Security Modules, Flash Controller, NAND Flash, Platform Security, Security Subsystems, Standard cell
View Details

Securyzr iSSP

Securyzr iSSP is an advanced integrated Security Service Platform that manages the security lifecycle of connected devices from chip to cloud. It provides a seamless solution for provisioning, firmware updates, security monitoring, and device identity management. This platform ensures reliability with zero-touch security services and is built to adapt to various lifecycle stages of embedded systems.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ArrayNav Adaptive GNSS Solution

ArrayNav is a groundbreaking GNSS solution utilizing patented adaptive antenna technology, crafted to provide automotive Advanced Driver-Assistance Systems (ADAS) with unprecedented precision and capacity. By employing multiple antennas, ArrayNav substantially enhances sensitivity and coverage through increased antenna gain, mitigates multipath fading with antenna diversity, and offers superior interference and jamming rejection capabilities. This advancement leads to greater accuracy in open environments and markedly better functionality within urban settings, often challenging due to signal interference. It is designed to serve both standalone and cloud-dependent use cases, thereby granting broad application flexibility.

etherWhere Corporation
3GPP-5G, Arbiter, Bluetooth, CAN, CAN-FD, FlexRay, GPS, IEEE 1394, Mobile DDR Controller, Optical/Telecom, Photonics, Receiver/Transmitter, RF Modules, Security Subsystems, W-CDMA
View Details

AES Core

The AES Core from Green IP Core provides robust encryption capabilities crucial for maintaining data security across a variety of platforms. It employs advanced encryption standards to safeguard sensitive information, thereby serving as a foundation for secure communication and data storage solutions. This IP is versatile enough to be implemented in both consumer electronics and large-scale enterprise systems where data protection is paramount. Designed with efficiency in mind, this core optimizes hardware resource usage, delivering high-speed encryption while minimizing impact on performance. Its architecture is specifically tailored to offer seamless integration into existing systems, requiring minimal reconfiguration of current operations. This adaptability makes it an ideal choice for companies looking to bolster their security measures without significant infrastructure changes. The AES Core stands out due to its fault-tolerant design, ensuring that it remains operable even under conditions that may induce errors in traditional systems. This reliability factor is key for industries where data integrity and security are of utmost importance, including finance, telecommunications, and government sectors.

Green IP Core
Content Protection Software, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Aeonic Integrated Droop Response System

The Aeonic Integrated Droop Response System introduces a revolutionary approach to managing voltage droop in intricate circuitry. By pairing droop mitigation with detection, it achieves unprecedented adaptability, responding within high-speed clock cycles, thus aiding in significant power savings. Equipped with multi-threshold detection and supported by standard interfaces like APB & JTAG, it facilitates remote and local droop management, providing a wealth of actionable insights for silicon lifecycle analytics. Design architects benefit from these insights, allowing precision-driven power management decisions. This tightly integrated system adopts a standard cell design, making it process portable across varying technological nodes. Its features ensure reliability and adaptability, aiding design teams to efficiently migrate solutions across evolving production landscapes.

Movellus
Analog Subsystems, Clock Synthesizer, DC-DC Converter, DLL, Peripheral Controller, Platform Security, PLL, SDRAM Controller, Security Subsystems
View Details

Securyzr Key Management System

The Securyzr Key Management System is pivotal in safeguarding cryptographic keys within various systems. By facilitating key lifecycle management, this system ensures that keys remain secure from creation through destruction. It offers an intuitive interface for administrators to oversee and manage keys across their network, providing peace of mind with enhanced access controls and auditing capabilities.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

RISC-V CPU IP NS Class

The RISC-V CPU IP NS Class is crafted explicitly for applications requiring heightened security and robustness, such as fintech payment systems and IoT security solutions. This processor class is equipped to support secure operations, incorporating features essential for protecting data and ensuring secure communications within devices. This processor integrates security protocols aligned with the RISC-V open standard, offering developers the ability to embed reliable security measures directly at the hardware level. Its architecture provides the foundation for developing systems where data integrity and secure processing are non-negotiable, ensuring that sensitive applications run safely and efficiently. The RISC-V CPU IP NS Class is supported by a strong ecosystem offering tools and resources to facilitate the secure application development process. With its ability to integrate seamlessly with other embedded systems, the NS Class empowers designers to create solutions that prioritize and enhance security in modern digital environments, where threats are constantly evolving.

Nuclei System Technology
CPU, Cryptography Cores, Embedded Security Modules, Microcontroller, Platform Security, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

PUFcc

The PUFcc is an advanced Crypto Coprocessor that amalgamates high-level cryptographic capabilities with a robust Hardware Root of Trust foundation. This IP module is thoroughly equipped with a full suite of cryptographic algorithms certified by NIST CAVP and compliant with OSCCA standards, tailored to fulfill complex and diverse IoT security needs. The coprocessor enhances security measures across multiple layers by integrating seamless key management and secure boot functionalities within its core operations, thus expanding security boundaries to external flash and other system components. Designed for ease of integration, PUFcc simplifies the process with built-in interfaces for swift memory access and data processing, bolstering system architecture with programmable flexibility to adopt evolving security protocols.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Integrated Secure Element

Integrated Secure Element (iSE) acts as the root of trust within a system on chip (SoC) design, offering services such as secure boot, key storage, and tamper protection. iSE is engineered to guard against unauthorized access by housing sensitive operations in a highly secure environment, making it indispensable for applications requiring a fortified security framework.

Secure-IC
Embedded Security Modules, Platform Security, Security Subsystems
View Details

NeoPUF

NeoPUF by eMemory Technology is a pioneering hardware security solution utilizing Physical Unclonable Function (PUF) technology. Designed to provide robust protection against unauthorized access and duplication, NeoPUF offers a unique security feature by exploiting the natural variability in silicon characteristics. This randomness is used to generate device-specific keys that are virtually impossible to replicate, ensuring a high level of security for sensitive data and cryptographic processes. NeoPUF's architecture supports a variety of security applications, including secure key storage and identity authentication. Its scalability and flexibility allow it to be integrated across different process nodes, making it an essential security element in IoT devices, automotive security systems, and other critical sectors requiring stringent cybersecurity measures.

eMemory Technology Inc.
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QDID PUF

The QDID PUF provides a unique identity based directly on quantum effects observed in standard CMOS processes. These identities are inherently secure due to the randomness that originates from variations in device oxide thickness and defect distribution. By leveraging such inherent unpredictability, QDID PUFs form a robust basis for hardware root-of-trust. This IP simplifies secure provisioning by avoiding traditional factory-based key injections, thereby reducing reliance on external secure manufacturing processes. QDID PUFs also ensure that identities are not stored in memory, instead being generated dynamically. This characteristic defends against side-channel attacks exploiting memory vulnerabilities. Additionally, the high entropy of the quantum effects they harness offers robust resistance to machine learning-based entropy source attacks, generating customizable security seeds up to 256 bits. Boosting its security, the QDID PUF integrates strategic countermeasures against side-channel attacks and has been certified to comply with stringent standards like PSA Level 2 and CC EAL4+. It supports wide-ranging environmental conditions and boasts extensive process node compatibility with major fabrication technologies. Typically used for key generation and device authentication, it represents the vanguard of cryptographic consistency for post-quantum applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 16nm, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Digital Systems and Security Solutions

Digital Systems and Security Solutions offer cutting-edge digital IP solutions that encompass security features vital for modern applications. These systems are designed to enhance encryption and data protection capabilities, ensuring a high level of security for sensitive information. By integrating advanced digital logic and security protocols, they are adept at handling complex computational processes while maintaining optimum performance. These solutions are integral for applications requiring stringent security standards, facilitating safe and efficient data handling and processing, thereby aligning with the industry's best practices for digital reliability and safety.

VeriSyno Microelectronics Co., Ltd.
Arbiter, Cryptography Cores, DDR, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

FortiPKA-RISC-V

FortiPKA-RISC-V is a high-speed public key accelerator that enhances the efficiency of cryptographic tasks by offloading complex operations from the main CPU. It is particularly effective for tasks involving large integer arithmetic typical in asymmetric cryptography. The design eliminates the need for data transformations linked to Montgomery domain conversion, boosting performance significantly. The RISC-V core allows flexible integration using interfaces such as AMBA AXI4, APB, and others. It supports a wide range of cryptographic algorithms including RSA, ECDSA, and SM2, maintaining resilience against side-channel attacks through robust technological methodologies. This solution proves ideal for embedded systems in IoT, automotive, and payment systems, offering high configurability to align with specific performance and area requirements.

FortifyIQ
All Foundries
All Process Nodes
AI Processor, AMBA AHB / APB/ AXI, Coprocessor, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems, Vision Processor
View Details

Post-Quantum Cryptography IP

This IP focuses on advancing encryption methods to counteract threats posed by quantum computing. By using algorithms robust enough to withstand the computational power of quantum machines, the Post-Quantum Cryptography IP ensures the continued confidentiality of sensitive data long into the future. Collaboration with industry and academia allows Secure-IC to be at the cutting edge of this technological evolution.

Secure-IC
3GPP-5G, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Resistant AES Core

Green IP Core's Fault Resistant AES Core elevates data encryption by combining robust cryptographic standards with enhanced fault tolerance. This technology is engineered to offer both security and reliability, addressing vulnerabilities that can arise from potential soft errors in cryptographic operations. This core is ideal for deployment in environments where faults can interfere with traditional AES implementations, such as in extreme environmental conditions or where high electromagnetic interference is present. It leverages intelligent error management, which preemptively identifies and corrects any anomalies, ensuring that encryption processes remain intact and reliable. Fault resistance in this core does not compromise its speed or efficiency. It continues to provide high-throughput encryption capabilities while ensuring that all security procedures are maintained under varying operational stresses. This makes it a valuable asset for sectors that require uncompromised data security, particularly where regulatory compliance is a factor, such as in healthcare, defense, and financial services.

Green IP Core
Content Protection Software, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

PUFhsm is an advanced Hardware Security Module (HSM) developed specifically for automotive and other high-security applications. It serves as an 'Embedded Security Enclave', freeing the main CPU from handling secure tasks while ensuring comprehensive protection through EVITA-Full compliance. With capabilities such as secure boot, updates, provisioning, and lifecycle management, PUFhsm stands as a robust solution for fulfilling stringent security requirements. The module integrates cryptographic engines and a dedicated CPU, and offers extensive features for managing cryptographic keys and securing communications. By adopting PUFhsm, designers can enhance security architectures, minimizing tampering risks and improving the overall reliability of systems in mission-critical environments.

PUFsecurity
Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

IMG DXT GPU for Mobile Devices

The IMG DXT GPU is tailored for the mobile device market, offering a unique blend of high efficiency and cutting-edge technology, including ray tracing capabilities. Utilizing Imagination's Photon architecture, the DXT promises enhanced performance for mobile visual applications, introducing ray tracing in various configurations to cater to different performance needs while keeping silicon costs in check. This GPU is adaptable, providing manufacturers with the option to integrate ray tracing in a cost-effective manner without sacrificing the mobile experience. With offerings that range from single to quad-RAC configurations, the DXT provides manufacturers the flexibility to choose setups that match their device specifications and performance benchmarks, making it a versatile choice for mobile technology companies. By providing realistic lighting effects in mobile devices, the IMG DXT GPU paves the way for unprecedented graphics quality in smartphones and tablets. It supports broader API coverage, including Vulkan and OpenGL, which ensures it can smoothly run a wide array of mobile applications, making it highly compatible with both existing and emerging technologies in the mobile graphics space.

Imagination Technologies
2D / 3D, Audio Interfaces, Ethernet, GPU, H.265, Security Subsystems, Vision Processor
View Details

AES Crypto

The AES Crypto Core from Dillon Engineering stands as a powerful tool for encryption and decryption. Developed through their ParaCore Architect technology, this core is highly adaptable to various application needs, providing tailor-made solutions for security requirements across different platforms. It supports a full suite of encryption modes, including ECB, CBC, CFB, OFB, and CTR, ensuring compliance with stringent security standards like FIPS 197. The core can achieve data throughput rates of up to 12.8 Gb/s, making it suitable for high-speed encryption needs in industries such as finance and telecommunications. Its ability to dynamically change encryption keys without affecting performance is an added advantage for applications requiring robust security in real-time environments. Available in both generic HDL and targeted EDIF formats, the AES Crypto Core is also furnished with a comprehensive testbench for ease of integration and reliability verification. This core is ideal for developers looking to incorporate strong cryptographic functions within their products while maintaining high performance and flexibility.

Dillon Engineering, Inc.
GLOBALFOUNDRIES, TSMC
40nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Fault Resistant Recovery Companion with Single Sequence Recovery

The Fault Resistant Recovery Companion with Single Sequence Recovery is designed to enhance the reliability of system operations by facilitating rapid recovery from faults with a minimal impact on system performance. This technology streamlines the fault recovery process through an innovative single sequence approach that mitigates the time typically required to restore system functionality. The recovery companion efficiently identifies and addresses faults, enabling systems to maintain operational integrity even in adverse conditions. Its design focuses on minimizing downtime and ensuring continuity of critical functions, making it especially suitable for sectors where uninterrupted operation is essential, such as telecommunications and critical infrastructure. Incorporating this IP enhances the overall resilience of complex systems, allowing them to withstand and quickly recover from unexpected disruptions. This capability is a major advantage in maintaining system reliability and performance in real-time data processing environments and in applications where constant availability is crucial.

Green IP Core
Input/Output Controller, Interrupt Controller, Security Subsystems, Timer/Watchdog
View Details

Suite-Q SW

Suite-Q SW consists of a versatile cryptographic software library designed for optimizing code size, stack usage, and performance across various embedded processors and microcontrollers. Available in portable C code and high-speed assembly, Suite-Q SW can be tailored to fit the specific needs of diverse development environments. This library provides extensive support for symmetric and asymmetric cryptographic functions, catering to systems ranging from high-end processors to memory-constrained embedded devices. By facilitating efficient cryptographic computations, Suite-Q SW ensures minimal impact on system performance while maximizing data security. Its adaptability is marked by simple integration modules that work seamlessly with hardware accelerators, enabling enhanced cryptography for both standard and custom specifications. This reliability makes Suite-Q SW an indispensable tool for ensuring secure communication channels while maintaining an optimal balance between speed and resource utilization.

PQ Secure Technologies, LLC
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

Suite-Q HW

Suite-Q HW represents a sophisticated system-on-chip (SoC) design that integrates essential cryptographic operations crucial for modern data security protocols. Targeting both high-end servers and low-end embedded systems, Suite-Q HW employs a unified hardware architecture to ensure efficient execution of cryptographic tasks. This hardware solution supports a diverse range of cryptographic algorithms, including both classical and post-quantum options. It incorporates advanced public key cryptographic operations such as ECDSA and various isogeny, lattice, and code-based strategies awaiting broader standardization. The suite’s flexibility allows it to adapt to different operational demands and integrate with existing infrastructure seamlessly. Suite-Q HW's cornerstone is its high degree of configurability, offering customizable performance based on targeted applications. This versatility ensures optimal resource allocation, making it a preferred choice for systems requiring stringent security measures without compromising on computational efficiency. With optional features for defending against differential power analysis (DPA) attacks, the SoC further enhances its defense mechanisms, ensuring robust protection against sophisticated threats.

PQ Secure Technologies, LLC
AI Processor, AMBA AHB / APB/ AXI, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing functions, featuring high throughput and area efficiency. Compliant with NIST's FIPS 202 standard, it supports the full suite of SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512. The engine also handles extendable output functions (XOF) like SHAKE-128 and SHAKE-256. Designed for security-critical applications, it offers full protection against timing-based side-channel attacks and operates within a single clock domain. This IP core is ideal for tasks requiring data integrity and secure authentication, such as blockchain, IPsec, and e-commerce. The SHA-3 IP core excels in various applications, from cryptographic hashing for Message Authentication Codes (MAC) and secure boot engines to encrypted data storage solutions and financial transaction systems. Its synchronous design and extensive verification make it highly reliable for maintaining data integrity across diverse protocols including TLS/SSL. Designed to integrate seamlessly into any FPGA or ASIC, it ensures maximal security and performance. Noteworthy features include automatic byte padding and an AMBA AXI4-Stream interface, facilitating easy implementation. With its proven resource efficiency, it serves a multitude of industries seeking robust cryptographic solutions. The SHA-3 engine is versatile enough for numerous security applications, maintaining performance efficiency even under demanding conditions.

KiviCore
HHGrace, TSMC
65nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key

The iShield Key by Swissbit is a state-of-the-art security device designed to safeguard both digital and physical access. Engineered to offer advanced protection, this device enables users to securely access websites, services, and corporate networks, while also providing secure physical entry control. By integrating easily into daily workflows, the iShield Key supports a comprehensive, hybrid security approach, making it ideal for use in diverse environments, from IT systems to secure printing solutions.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

DAES

The DAES is a sophisticated cryptographic co-processor IP designed to implement the Rijndael encryption algorithm, which forms the basis of the Advanced Encryption Standard (AES). By supporting key sizes of both 128 and 256 bits, this core provides robust encryption capabilities through various cipher modes including ECB, CBC, CFB, OFB, and CTR, ensuring diverse applications can leverage these functionalities for enhanced data security. The DAES core is equipped with an internal key expansion module, allowing it to manage encryption and decryption operations efficiently. It offers seamless integration into APB, AHB, and AXI buses, enabling it to be easily incorporated into a wide variety of digital solutions where encryption is paramount. This IP core is adaptable, providing developers with a reliable and scalable solution to safeguard sensitive data across multiple platforms and environments. The DAES benefits sectors that heavily rely on encryption for secure transactions and communications, making it a valuable asset in industries like finance, government, and telecommunications.

Premium Vendor
DCD-SEMI
Cryptography Cores, Security Subsystems
View Details

Keccak Hash Engine

The Keccak Hash Engine IP Core serves as a flexible and versatile cryptographic function suitable for a variety of applications beyond hashing, including encryption, authentication, and pseudo-random number generation (PRNG). The core uses the innovative sponge construction, particularly the Keccak-f cryptographic permutation, providing excellent security and adaptability. Standardized by NIST and utilized in 3GPP TS 35.231 for mobile telephony, Keccak is adaptable to different output lengths and security levels, making it ideal for diverse industrial applications like blockchain and secure communications. Its design simplifies integration and coding practices, featuring a single clock domain for seamless deployment. The IP core ensures flexibility and robust security, allowing easy configuration to meet specific security requirements. It is extensively verified for secure use in various protocols, offering consistent and reliable performance in maintaining data integrity and encryption tasks.

KiviCore
HHGrace, TSMC
65nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Root of Trust

Rambus provides comprehensive Root of Trust (RoT) solutions designed to elevate the security capabilities of SoC hardware platforms. This security IP is integrally linked with programmable secure co-processors and supports features like Quantum Safe Cryptography. The Root of Trust is based on the latest security protocols providing FIPS 140 CMVP and ISO 26262 options suitable for government and automotive sectors. With an emphasis on flexibility, these solutions secure data throughout its lifecycle, offering robust protections against hardware and software threats.

Rambus
Embedded Security Modules, Platform Security, Security Subsystems
View Details

Soft Fault Detection IP

Soft Fault Detection IP is a sophisticated tool developed by Green IP Core to proactively manage transient faults in digital systems. It intuitively detects deviations in logical operations caused by soft errors and flags these occurrences, ensuring that corrective actions can be taken before the errors impact overall system performance. This IP is crucial for environments where fluctuations and anomalies are frequent, such as mission-critical and industrial applications requiring continuous monitoring for deviations. Its implementation reduces the risk of uncorrected faults leading to system failures, thus enhancing the reliability and longevity of the digital systems it supports. The technology integrates smoothly with existing systems, offering a low-power, efficient solution to fault management needs. This makes it an essential asset for maintaining operational stability in diverse application areas, ensuring that systems remain reliable and resilient against potential disruptions.

Green IP Core
AI Processor, Cryptography Cores, Input/Output Controller, Interrupt Controller, Receiver/Transmitter, Security Subsystems
View Details

iShield HSM

The iShield HSM by Swissbit is an innovative hardware security module designed to protect IoT devices by storing security keys securely, thus providing robust device authentication and registration. This plug-and-play security anchor can seamlessly retrofit existing AWS IoT Greengrass devices, offering an essential upgrade for field-deployed systems. The iShield HSM ensures that device encryption keys are stored securely, preventing unauthorized duplication and enhancing overall system security through reliable hardware-based protection.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

UniqueID PUF Core

The UniqueID PUF Core utilizes microscopic variations inherent in manufacturing to create a distinct fingerprint, enabling robust security features through physically unclonable functions (PUFs). This technology is pivotal for creating secure cryptographic keys, key to safeguarding data through processes like encryption and decryption. By leveraging these intrinsic variations found in each chip, the UniqueID PUF Core offers an unmatched security method, ensuring each device has a unique identity that is nearly impossible to replicate. This translates to enhanced security measures that adapt to the growing demand for secure communication and data protection. In an era where cybersecurity is increasingly critical, this core is tasked with providing inherent security to devices by facilitating secure operations inherently tied to the uniqueness of each FPGA. Its application spans across secure communications, safe data transfer systems, and reducing potential breaches by enforcing a robust layer of hardware security.

Cologne Chip AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

ReRAM Secure Keys

ReRAM Secure Keys focus on enhancing cryptographic security by leveraging the unique physical unclonable function (PUF) capabilities of CrossBar's ReRAM technology. ReRAM's structured randomness and resistance to invasive attacks offer improved security margins over traditional SRAM-based PUF solutions. CrossBar's PUF keys use ReRAM's inherent characteristics, such as high randomness and low bit error rates, to reach new levels of device security. It offers robust protection against side-channel and tampering attacks while ensuring fast production across varying environmental conditions like temperature or interference. These secure keys are especially beneficial in securing IoT devices, smart electronics, and infrastructure systems, as they deliver a "root of trust" foundation necessary for achieving secure communications. CrossBar's PUF offers an effective alternative for embedded applications where traditional flash isn't viable.

CrossBar
TSMC
28nm
Cryptography Cores, Embedded Memories, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details

Fault Detector

The Fault Detector is a fully digital solution engineered to identify faults within its logical circuitry. This versatile technology is crafted to pinpoint areas susceptible to soft errors or faults, flagging inconsistencies at its output. It achieves this through an embedded fault detection, management, and correction circuit meticulously integrated into the logical circuits. This proactive approach ensures the logical functions continue seamlessly, maintaining system integrity even when internal discrepancies occur. This advanced detection capability is crucial in environments where reliability cannot be compromised, such as in automotive and aerospace systems or critical industrial applications. The IP's flexibility allows it to be synthesized across a broad range of devices, ensuring compatibility with diverse platforms. Moreover, the Fault Detector exemplifies power efficiency, consuming additional energy only during fault correction processes, thus ensuring resourcefulness in its operation. This IP becomes an essential tool for developers seeking to integrate sophisticated error management into their systems, guaranteeing enhanced product reliability and longevity.

Green IP Core
Cryptography Cores, Input/Output Controller, Peripheral Controller, Security Subsystems, Standard cell, Timer/Watchdog
View Details

PQPlatform - TrustSys

The only PQC-first RoT with silicon-proven SCA resistance, and FIA PQPlatform-TrustSys is a complete PQC-focused security system that provides architects with the tools needed for the quantum age, and beyond. PQPlatform-TrustSys is a fully updatable Root-of-Trust subsystem, containing advanced post-quantum (ML-KEM, ML-DSA) and classical cryptography (ECC and RSA – essential for hybrid and legacy protocols during transition), enabling bulk encryption, hash acceleration, advanced accelerators for symmetric cryptography, including AES, SHA-2, SHA-3, HMAC, and seamless integration with third-party components. With crypto agility in mind, PQPlatform-TrustSys helps with the PQ/T hybrid secure-boot use case and includes our world-leading fault-tolerance and power/EM side-channel attack countermeasures.

PQShield
Cryptography Cores, Security Subsystems
View Details

Swissbit TSE Fiscal Compliance Solution

The Swissbit TSE Fiscal Compliance Solution provides a secure and flexible method to handle tamper-proof recording of point-of-sale (POS) data, adhering to the German Cash Security Ordinance. This product is optimal for use in a variety of POS systems, whether standalone, networked within a LAN, or those connected to cloud services. It offers simple integration, ensuring business compliance while safeguarding critical fiscal data, with additional connectivity options to the MeinFiskal platform for expanded functionalities.

Swissbit AG
Content Protection Software, Embedded Security Modules, Security Subsystems
View Details

iShield Key MIFARE FIDO Security Token

Swissbit’s iShield Key MIFARE FIDO Security Token is a multi-functional security key designed for strong authentication in accessing digital services and physical premises. By supporting advanced encryption standards and providing a hardware-based security approach, this key ensures protection against phishing and unauthorized access, integrating seamlessly into various security frameworks. The token offers the ease of a plug-and-play device, suitable for IT infrastructures aiming to enhance security with minimal user disruption.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key 2

The iShield Key 2 is an all-in-one security key that facilitates digital and physical access management. Featuring enhancements such as MIFARE DESFire EV3 and FIPS 140-3 Level 3 certification, it delivers heightened security for challenging applications requiring robust access control solutions. Its construction supports both digital interface applications and tangible access scenarios, making it versatile for use across various security implementations.

Swissbit AG
Embedded Security Modules, Input/Output Controller, Security Subsystems
View Details

Fault Injection Detection

Fault Injection Detection technology offers a defensive layer against physical manipulation attempts on semiconductor devices. It includes modular detectors to identify anomalies in clock, power, and thermal profiles, crucial for maintaining the integrity of secure embedded systems. This IP is particularly relevant for applications in highly regulated fields like automotive, medical, and industrial electronics. The IP can be customized for sensitivity levels and pulse durations to match specific threat models of a given SoC design. By incorporating such defenses alongside existing cryptographic measures, it significantly enhances the security profile and resilience of a system against real-world attack vectors. Features like glitch detection, thermal anomaly sensors, and voltage monitoring work cohesively to shield cryptographic cores and trusted modules from physical tampering. Together they form a certified-ready design solution that aligns with stringent industry standards, simplifying the process of achieving necessary hardware security certifications.

Crypto Quantique
AV1, Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

FortiCrypt Library

The FortiCrypt Library is a high-performance software library offering strong protection against side-channel and fault injection attacks, including the sophisticated SIFA threat. Suitable for field-deployed devices, it is built on proven algorithms and provides impressive performance levels, enabling secure processing even on lower-spec processors. The library employs robust protection schemes such as RAMBAM, which implements attack resistance using finite field arithmetic, all without incurring extra latency. Ensuring security as well as operational efficiency, the FortiCrypt products have undergone rigorous testing, including the Test Vector Leakage Assessment (TVLA) methodology, validating their reliability under extreme conditions. Ideal for sectors needing comprehensive protection, this library not only defends against vulnerabilities but also secures Ultra HD video streaming and other data-intensive processes.

FortifyIQ
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details

Agile Secure Element

The Agile Secure Element offers customizable, high-security solutions for SoCs, focusing on embedding trust despite area limitations. It integrates a secure processor, hardware-engineered cryptographic functionalities, and capabilities allowing for secure boot, key storage, and trusted execution to fortify your silicon designs. Equipped with an optional RISC-V core, the subsystem ensures secure management of key functions and efficiently controls lifecycle management, making it an excellent support for compliance with various security standards. Agile Secure Element’s efficient modular design simplifies certification processes and enhances product scalability. It supports a comprehensive range of cryptographic processes, including cutting-edge post-quantum algorithms. The secure microprocessor subsystem, combined with versatile interface compatibility, makes integrating it into heterogeneous and subsystem-based SoCs straightforward and fast. This flexible security structure aids in swift market entry without the cost and delay of custom solutions.

Crypto Quantique
Embedded Security Modules, Platform Security, Security Subsystems
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt