Our IP is hosted on Silicon Hub, letting you download trial versions instantly. Browse our IP below, or find out more.
Foresemi's DesignHaven™ security IP series is mainly used to protect hardware data security, including mainstream international and domestic cryptographic algorithm computing modules that meet major standards. The series supports cutting-edge technologies such as CryptRoT and PQC based on CIM, deployable in ASIC or FPGA. Foresemi offers both independent IP and subsystem-level solutions compatible with ARM or RISC-V CPU. Features include Public Key Cryptography, Symmetric cipher SCE, and True Random Number Generators.
TRNG (True Random Number Generator) includes random source, post-processing algorithm, failure detection, and random number health monitoring based on digital standard units, which is in line with the National Secret Level 1 & 2/NIST/AIS standards. The module supports a standard AMBA bus for quick integration into the SoC.
HASH (Hash Function Engine) is used to calculate mainstream international and domestic hash functions (hash algorithms) and supports HMAC operation mode. HASH provides an optional physical attack protection design and can support module-specific DMA. The module supports a standard AMBA bus for quick integration into the SoC. This engine includes features such as dedicated high-speed DMA, interleaving context management, and physical attack protection against DPA and FI attacks. Supported algorithms include SHA1, SHA2, SHA3, SM3, HMAC, BLAKE, and Uncle 12/Uncle20 Poly1305.
SCE (Symmetric Cipher Engine) is used to calculate mainstream international & domestic symmetric cryptographic algorithms, and provides a variety of operation modes. SCE provides multiple versions such as ultra-low area, pipeline, and ultra-high-performance multi-core pipeline, and provides options for physical attack protection design, which can support module-specific DMA. SCE can be integrated into the SoC via a standard AMBA bus or into a data encryption path such as DDR, PCIe, CXL, and other high-speed interfaces.
The public key cryptography module is mainly used to calculate RSA and elliptic curve ECC, covering RSA1024–4096, SECP prime domain curve, SM2 curve, Brainpool curve, and 25519 curve. PKA (Public-Key Accelerator) is used to calculate complex modulo operations and point operations in public key cryptography, and the protocol part is assembled by the firmware. PKE (Public-Key Engine) not only includes the functions of PKA, but also hardens the operation of some protocols to maximize the computing power of the CPU. PKA/PKE is available in multiple versions, including ultra-low area and ultra-high performance, and provides options for physical attack protection design. The module supports a standard AMBA bus for quick integration into the SoC.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!