The confidentiality and integrity of cryptographic key material is critical to maintaining system security. A hardware root of trust, such as the Rambus CryptoManager Root of Trust, is designed to securely generate, store, and employ cryptographic keys. Tortuga Logic has independently verified the policies surrounding access to keys stored within registers in the CryptoManager Root of Trust using its Radix™ pre-silicon security verification platform.
Security Verification of Rambus’ CryptoManager Root of Trust by Tortuga Logic
The Importance of Chiplet Security
Chiplets are gaining significant traction as they deliver numerous benefits beyond what can be accomplished with a monolithic SoC in a time of slowing transistor scaling. However, disaggregating SoCs into multiple chiplets increases the attack surface which adversaries can exploit to penetrate safeguards to data and hardware. With chiplets, the risks of hardware-based trojans and exploits such as man-in-the-middle attacks all rise. To realize the many benefits of chiplets, designers should use a design for security approach, and implement security safeguards anchored in hardware.
MACsec-IP-160 Product Brief
The MACsec-IP-160 is a versatile MACsec solution for silicon devices that require plug-and-play MACsec processing for an Ethernet port at full line rate. It provides classification, transformation and statistics for the IEEE0802.1AE standard MACsec. Additionally, it supports VLAN-in-clear use cases.
よりセキュアなシリコンサプライチェーン (A More Secure Silicon Supply Chain)
Counterfeit chips are large and growing problem putting both civilian and military supply chains at risk. Estimates of the size of the counterfeit market run to $75B and more. With electronics at the heart of so many of the products we depend upon, the risks of counterfeit semiconductors range from inconvenience to loss of property and life.
AIと5Gにより高まるIoT機器の脅威 (5G and AI Raise Security Risks for IoT Devices)
5G represents a revolution in mobile technology with performance that will rival that of wireline networks. 5G’s Ultra-reliable Low Latency Communication (uRLLC) links will enable a profusion of artificial intelligence (AI)-powered IoT devices from delivery drones to smart cities. The rapid rise in the number of smart IoT devices, coupled with expanded connectivity, will greatly escalate the growth of data and network traffic.
チップ攻撃技術の全貌とその対策 (Anti-Tampering Technologies)
The design of chip anti-tamper protection needs to adapt and scale with rising threats. Adversaries range from high school hackers to well-funded state actors. Given the threats, it’s useful to think about anti-tamper countermeasures as a hierarchy of safeguards that parallel the type, effort and expense of attacks.

