Security icon


CryptoManager Infrastructure

Our CryptoManager Infrastructure is a high-performance enterprise class device provisioning solution that reduces operating costs and accelerates time-to-market. It is designed to seamlessly integrate into existing manufacturing flows with minimal interruption.


Product Brief

Data Brief

CryptoManager Infrastructure block diagram

How it works

Our Infrastructure enables the secure provisioning of cryptographic information throughout the distributed manufacturing supply chain. The cryptographic information covers a broad range of secure transactions, including key delivery and programming, protection of debug modes, and chip feature management. The CryptoManager Infrastructure can be used to provision the device specific information to any security IP core, including our CryptoManager Security Engine. The system is comprised of the CryptoManager Control Center and Appliance(s).

The Control Center is a security control system that works with the root authority to distribute the cryptographic information to the Appliances, which are tamper resistant servers that are integrated with existing test equipment to provision the devices. This allows for production monitoring and dynamic SKU management to meet demand in real-time. The production information, such as yield, configurations and inventory levels, is available via secure logs which protect against cloning, counterfeiting, and overbuilding.

Solution Offering

CryptoManager Control Center The CryptoManager Control Center is a security control system that works in conjunction with an off-line Root Authority. It manages the distribution of data assets with the appropriate authorizations to connected CryptoManager Appliances. It includes an easy-to-use Administration Console for operators to centrally manage the Infrastructure across multiple manufacturing sites.
CryptoManager Appliance The Appliance is a tamper-resistant, rack-mounted server, deployed in high-volume manufacturing facilities or cloud services data centers, that provides local security and handles the distribution and programming of secret keys and device configuration data. It also delivers secure production logs and system health data to the Control Center. The appliance is designed to integrate with existing test equipment.


DPA Countermeasures


DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

From the blog

Related Markets & Applications

Mobile Edge
Data Center