Security icon

Security

CryptoManager Root of Trust

The CryptoManager Root of Trust is a fully-programmable hardware security core that protects against a wide range of attacks with state-of-the-art anti-tamper and security techniques to offer vendors security by design.

Contact

Product Brief

How the Root of Trust Works

The CryptoManager Root of Trust is an independent hardware security block for integration into semiconductor devices, offering secure execution of user applications, tamper detection and protection, secure storage and handling of keys and security assets, and resistance to side-channel attacks. The core mitigates against attacks like Meltdown and Spectre by allowing secure processing to be separated from general processing in a siloed architecture. Readily deployable, the Root of Trust is easily integrated with industry-standard interfaces and system architectures and includes hardware cryptographic accelerators for standard algorithms such as AES, SHA, RSA, ECDSA and ECDH. The layered security approach enforces that access and critical operations, including crypto modules, keys, memory ranges, I/O pins, and other resources, are available thru hardware only with no access by software.

CryptoManager Root of Trust diagram

The CryptoManager Root of Trust is based on a custom 32-bit RISC-V CPU designed specifically to provide a trusted foundation for secure processing in the core and system. The RISC-V CPU runs signed code modules called containers, which include permissions and security-related metadata. These containers can implement standard security functionality, or complete customer-specific security applications, including key and data provisioning, security protocols, biometric applications, secure boot, secure firmware update, and many more. Part of the comprehensive CryptoManager Security Platform that includes embedded cores, key provisioning infrastructure and infield services, the Root of Trust provides the highest level of end-to-end security at all stages of the chip lifecycle for applications like IoT, automotive, sensors, and connectivity.

Download CryptoManager Root of Trust - Implementing Security by Design

Solution Offering

Inventions

DPA Countermeasures

security-icon
DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

From the blog

Related Markets & Applications

Automotive
Mobile Edge
Data Center
IoT