Security Icon


CryptoManager Infrastructure

The Rambus CryptoManager Infrastructure is a secure supply chain solution for semiconductor and device manufacturers, enabling secure provisioning, key insertion, and cloud key management. Designed to seamlessly integrate into existing manufacturing flows with minimal interruption, CryptoManager Infrastructure currently secures over 1.8 billion devices per year (and counting).

How CryptoManager Infrastructure works

CryptoManager Infrastructure enables the secure provisioning of cryptographic keys and other sensitive data throughout a distributed supply chain, including both captive and 3rd party (untrusted) manufacturing locations. CryptoManager’s secure provisioning and configuration capabilities cover a broad range of secure operations, including key delivery and programming, protection of debug and other sensitive ports, and feature configuration for chips and devices. The CryptoManager Infrastructure can be used to provision device specific information to any on-chip secure enclave, including the Rambus family of CryptoManager Root of Trust cores.

How CryptoManager Infrastructure works

Security starts in the CryptoManager Control Center. It enables simple and intuitive administration for secure provisioning of high value keys and data into semiconductor devices. Removing the human element out of key injection, secret cryptographic keys are protected end-to-end and injected automatically, enabling manufacturing integrity and security. As the keys are only known to the semiconductor OEM (and not other within the supply chain), they can be guaranteed secure.

Those cryptographic keys are the foundation of device security: device authentication, attestation, and unique identification.  Using the Rambus Key Management Service, device OEMs can enable cloud-based key management services leveraging those securely provisioned keys to enable supply chain integrity, and for device and data security for connected hardware.  Those OEMs can guarantee that their products only contain ‘known-authentic’ components at any point, anywhere, in their product’s lifecycle. Those keys can be leveraged to provide an immutable device ID, enable secure FOTA, and provide a business model of “key management as a service”.

CryptoManager Infrastructure is a foundational product in any secure supply chain ecosystem.

Solution Offerings

  • Cluster support for high availability and scalability
  • Dynamic SKU management
  • Ability to provision secure data to any secure IP core or chipset
  • Comprehensive system monitors and alerts
  • Secure browser-based management console
  • Business continuity/disaster recovery
  • Meets manufacturing critical performance requirements
  • Advanced key and data management
  • Verify manufacturing volumes, yields, and configurations
  • Monitor production status, availability, and inventory levels
  • Protect against cloning, reverse engineering, counterfeiting, and overbuilding
  • Secure offline Root Authority for managing system permissions and authorizations
  • Provision cryptographic information securely in untrusted environments
  • Advanced encrypted key and data storage
  • Two-factor user authentication

CryptoManager Infrastructure Equipment

  • Root Authority (optional)
  • Server (Cluster)
  • Appliance (Cluster)

CryptoManager Control Center

Full Documentation

  • Root Authority Guide
  • Service Guide
  • Appliance Guide
  • Admin Console API Guide


  • 24×7 Infrastructure Support
  • Software Maintenance
CryptoManager Control CenterThe CryptoManager Control Center is a security control system that works in conjunction with an off-line Root Authority. It manages the distribution of data assets with the appropriate authorizations to connected CryptoManager Appliances. It includes an easy-to-use Administration Console for operators to centrally manage the Infrastructure across multiple manufacturing sites.
CryptoManager ApplianceThe Appliance is a tamper-resistant, rack-mounted server, deployed in high-volume manufacturing facilities or cloud services data centers, that provides local security and handles the distribution and programming of secret keys and device configuration data. It also delivers secure production logs and system health data to the Control Center. The appliance is designed to integrate with existing test equipment.
Key Management ServiceA cloud-based key management service which can be leveraged by both semiconductor and device OEMs. The service enables those parties to secure connect to devices anywhere in the field, allowing the OEM to enable a number of functions, including immutable device ID, secure FOTA, and “key material as a service” business models.
The CryptoManager Root of Trust

The CryptoManager Root of Trust

Built around a custom RISC-V CPU, the Rambus CryptoManager Root of Trust (CMRT) is at the forefront of a new category of programmable hardware-based security cores. Siloed from the primary processor, it is designed to securely run sensitive code, processes and algorithms. More specifically, the CMRT provides the primary processor with a full suite of security services, such as secure boot and runtime integrity, remote attestation and broad crypto acceleration for symmetric and asymmetric algorithms.
Download White Paper

Use Cases

Security Icon


Large OEM customers requesting personalization, customer specific data preparation and feature customization of standard parts challenge the chipmakers ability to minimize inventory overhead and improve operating efficiencies.

Security Icon

Secure Key Provisioning

With mobile devices housing more and more sensitive data that is utilized in a wide variety of applications, chip and device companies must meet the complex security requirements for each potential use case or capability.
Security Icon

Debug Access Control

The CryptoManager solution provides a method for chip and device companies to authenticate the device and authorize the provisioning of the debug enable/disable operation for each device.

Related Markets & Applications