Found 55 Results

Circuit Camouflage Technology

https://www.rambus.com/security/anti-counterfeiting/circuit-camouflage-technology/

Security Circuit Camouflage Technology Rambus Circuit Camouflage Technology protects semiconductors against reverse engineering and cloning by competitors, state actors, and nefarious parties. Circuit Camouflage is an anti-reverse engineering and anti-cloning technology designed for commercial and government applications. It provides protection at the standard-cell level, using proprietary techniques that significantly decrease the accuracy of automated tools used […]

Secure Device Provisioning

https://www.rambus.com/security/provisioning-and-key-management/device-provisioning/

Security Secure Device Provisioning Protect your device secrets throughout the manufacturing process. We revolutionize secure provisioning by offering the simplest secure way of injecting secret identity data to a device. ContactProduct Brochure How Secure Device Provisioning works Secure Device Provisioning (formerly from Inside Secure) ensures that secrets are not exposed or manipulated when provisioned at […]

Secure Silicon Provisioning

https://www.rambus.com/security/provisioning-and-key-management/silicon-provisioning/

Security Secure Silicon Provisioning We provide secure programming of your technology secrets during chip manufacturing, at the OEM and/or in the cloud.ContactProduct Brochure How the Secure Silicon Provisioning works The Secure Silicon Provisioning Platform (formerly from Inside Secure) allows Rambus to serve as an independent License Authority provisioning secret values into SoCs/Modules to enable secure […]

Inside Secure MACsec Toolkit

https://www.rambus.com/security/protocol-engines/macsec-engines/macsec-toolkit/

Security Inside Secure MACsec Toolkit for Ethernet Security Inside Secure MACsec Toolkit enables developers to quickly add complete MACsec support in new and existing products such as switches, routers or hosts. it includes a full C source code implementation of the control plane, especially the MACsec Key Agreement (MKA) protocol, as well as the data […]

That’s why I need Multiple Roots of Trust (+Examples)

https://www.rambus.com/blogs/multiple-roots-of-trust/

Do multiple roots of trust offer the absolute security? Why do we need them after all? Let’s see. In this article: Why to use multiple Roots of Trust? What if I don’t have multiple roots of trust? What is a secure master root? What is signed software? How do keys support multiple roots of trust? […]

Rambus’ Ben Levine talks IoT security and cryptography with EDA Café

https://www.rambus.com/blogs/rambus-ben-levine-talks-iot-security-and-cryptography-with-eda-cafe-2/

Ben Levine, Senior Director of Product Marketing at Rambus, recently sat down with Sanjay Gangal of EDA Café to discuss IoT security and cryptography. According to Levine, security should be embedded in every chip. More specifically, says Levine, a separate hardware-based security core can help protect both the SoC itself and the system it powers. […]

Secure Boot

https://www.rambus.com/security/software-protocols/secure-boot/

Secure Boot Contact Us The Rambus Secure Boot solution (formerly from Inside Secure) provides tools for integrating security into an embedded device’s system boot sequence. The Secure Boot solution uses strong cryptography to protect the boot process of SoCs and application processors. ContactSupports multiple flexible bootstrap stagesSupport of third-party signing through certificatesSupport for hardware acceleration, key […]

High Speed Public Key Accelerator

https://www.rambus.com/security/protocol-engines/high-speed-public-key-accelerator/

Security High Speed Public Key Accelerator The Rambus High Speed Public Key Accelerator PKI-IP-154 (EIP-154 formerly the Inside Secure) is a family of cryptographic IP cores designed for full scalability and an optimal performance over gate count ratio. The PKA-IP-154 can be deployed in any semiconductor design that needs key exchange or key generation at […]

Hacking the vote

https://www.rambus.com/blogs/hacking-the-vote/

In late 2018, six researchers published a DEF CON report that detailed a range of critical security vulnerabilities affecting voting equipment and related computer systems. These include supply chain insecurity, proven susceptibility to remote attacks, machines that can be hacked faster than an actual vote and perpetually unpatched vulnerabilities. Let’s take a closer look at […]

DARPA wants secure silicon and scalable defense mechanisms

https://www.rambus.com/blogs/darpa-wants-secure-silicon-and-scalable-defense-mechanisms/

Automatic Implementation of Secure Silicon (AISS) The Defense Advanced Research Projects Agency (DARPA) recently published an article that details the goals of its Automatic Implementation of Secure Silicon (AISS) program. As the name implies, AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while enabling designers to explore economics versus […]

Rambus logo