Security IP icon

Security

Root of Trust Solutions

Providing a hardware-based foundation for security, Rambus offers a catalog of robust Root of Trust solutions, ranging from richly featured military-grade co-processors to highly compact state machines-based designs. With a breadth of solutions applicable from the data center to Internet of Things (IoT) devices, Rambus has a Root of Trust solution for almost every application.

Secure Programmable Root of Trust Security Solutions

Solution Brief Applications
RT-630 Download the Root of Trust RT-630 Product Brief Cloud and AI/ML applications
RT-640 Download the Root of Trust RT-640 Product Brief Automotive ISO-26262 ASIL-B embedded Hardware Security Module
RT-641 Download the Root of Trust RT-641 Product Brief Automotive ISO-26262 ASIL-B embedded Hardware Security Module for the Chinese market
RT-645 Download the Root of Trust RT-645 Product Brief Automotive ISO-26262 ASIL-D embedded Hardware Security Module
RT-650 Download the Root of Trust RT-650 Product Brief Highly-secure government applications requiring DPA resistance
RT-660 Download the Root of Trust RT-660 Product Brief Highly-secure data center applications requiring DPA & FIA resistance
RT-1660 Download the Root of Trust RT-1660 Product Brief Highly-secure defense applications requiring DPA & FIA resistance
RT-630-FPGA Download the Root of Trust for FPGAs Product Brief FPGA-specific implementation of the RT-630
RT-660-FPGA Download the Root of Trust for FPGAs Product Brief FPGA-specific implementation of the RT-660
RT-600 SDK Download the Root of Trust CSDK Product Brief SDK for RT-6xx secure application development

Firmware-Controlled Root of Trust Security Solutions

Solution Brief Applications
RT-120 Download the Root of Trust RT-100 Product Brief IoT clients and sensors
RT-121 Download the Root of Trust RT-121 Product Brief IoT clients and sensors for the Chinese market
RT-130 Download the Root of Trust RT-130 Product Brief IoT servers, gateways, edge devices and sensors
RT-131 Download the Root of Trust RT-131 Product Brief IoT servers, gateways, edge devices and sensors for the Chinese market>
RT-260 Download the Root of Trust RT-260 Product Brief Secure MCU-based devices and sensors
superior protection icon

Superior Security

Provide a robust hardware foundation for security

Protect valuable secret keys, credentials and other sensitive data

Adapt to an evolving threat environment

Design Flexibility

Select a solution tailored to specific application needs

Programmable and fixed function architectures

Varying crypto and DPA protection capabilities

improved profitability icon

Improve Profitability

Reduce NRE and operating costs

Eliminate costs of compromised devices

Offer new services through programmability

Secure Programmable Root of Trust Security Solutions

The Rambus Root of Trust RT-600 family of fully programmable FIPS 140-2 certified and FIPS 140-3 compliant hardware security cores offers security by design for cloud, AI/ML, automotive, government, defense, data center, as well as general purpose semiconductor applications. The RT-600 family protects against a wide range of hardware and software attacks through state-of-the-art anti-tamper and security techniques.

Feature Description RT-630 RT-640 RT-641 RT-645 RT-645 RT-660 RT-1660
Application Focus Example Applications AI/ML/Cloud Automotive Automotive Automotive Government Data Center Defense
FIPS 140 CAVP FIPS 140-2 & FIPS 140-3 CAVP Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
FIPS 140 CMVP FIPS 140-2 & FIPS 140-3 CMVP Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
DPA DPA Resistance RSA/ECC RSA/ECC RSA/ECC RSA/ECC Check Icon Check Icon Check Icon
FIA FIA Resistance Check Icon Check Icon
Automotive ISO26262 ASIL Level ASIL-B ASIL-B ASIL-D
Key Derive Secure Key Derivation Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Key Agreement ECDH, DH Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Key Transport Key Wrap Mechanisms Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Roots Multiple Roots/Key Splits 4/8 4/8 4/8 4/8 8/8 8/8 8/8
Secure Boot Secure Boot Assist P-512 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Secure Debug Secure Debug P-512 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Secure Lifecycle Lifecycle Stage Management Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Secure Feature Feature and SKU Management Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Anti Tamper Power and Clock Glitch Monitor Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Memory ECC Memory Error Correction Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Crypto Accelerators TRNG-RSA-ECC-AES-SHA2-SHA3 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
Crypto Accelerators Optional
Performance Crypto & Hash Performance Gbps 6 6 6 6 3 6 6
I/O bus AXI or AHB AMBA Interface Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
OTP APB OTP Management Interface Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
PUF PUF Interface Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
DPA RSA & ECC DPA Resistances Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
DPA AES DPA Resistance Check Icon Check Icon Check Icon
DPA HMAC-SHA-2 DPA Resistance Check Icon Check Icon
FIA RSA & ECC & AES FIA Resistance Check Icon Check Icon
TRNG True Random Number Generator SP800-90 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
RSA HW Accelerators 4K (up to 8K) Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
ECC HW Accelerators 521 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
ECC Curves NIST – Brainpool – 25519 – 448 Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
AES HW Accelerators Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
AES CBC-CTR-CCM-CMAC-CFB-OFB Mode Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
AES GCM-GMAC Mode Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
AES XTS Mode Check Icon Check Icon Check Icon Check Icon
SM2-3-4 HW Accelerators Check Icon
SHA-2 (HMAC-)SHA-2 Accelerators Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon Check Icon
SHA-2 (HMAC-)SHA-2 Max Mode 512 512 512 512 512 512 512
SHA-3 (HMAC-)SHA-3 Accelerators Check Icon Check Icon Check Icon Check Icon
SHA-3 (HMAC-)SHA-3 Max Mode 512 512 512 512 512 512 512
CPP ChaCha Poly Accelerators Optional Optional Optional
Whirlpool HW Accelerators Optional Optional Optional Optional
3DES HW Accelerators Optional
Download Going Beyond the Requirements of a Root of Trust for Measurement with the Silicon-Proven RT-660 Root of Trust

Going Beyond the Requirements of a Root of Trust for Measurement with the Silicon-Proven RT-660 Root of Trust

The continuously evolving technology landscape and security requirements for systems present many challenges for device and silicon manufacturers. Nowhere is this truer than in data centers. Rambus has long recognized the need for security designs in data centers, and the Caliptra initiative discussed in this white paper is a welcome step towards a widespread adoption of Root of Trust designs in SoCs. Read this white paper to learn key features of the Rambus RT-660 Root of Trust and how it can be used for Caliptra use case scenarios

Firmware-Controlled Root of Trust Security Solutions

Designed to be integrated in power and space-constrained SoCs or FPGAs, the RT-100 and RT-200 Root of Trust families (formerly VaultIP) are FIPS 140-2 certified and FIPS 140-3 compliant hardware security modules that guard the most sensitive assets on chips and establish the foundation for platform security.

Featuring a firmware-controlled architecture with dedicated secure memories, the RT-100/200 families provide a variety of cryptographic accelerators including AES, SHA-2, RSA and ECC. Ideal for power and space-sensitive applications like Secure MCUs, IoT servers, gateways and edge devices, the RT-100/200 families offer the best balance of size and performance available on the market.”

Feature Description RT-120 RT-130 RT-131 RT-260
Application Focus Example Applications IoT Sensor IoT Gateway IoT Gateway (CN) Secure MCU
FIPS 140 CAVP FIPS 140-2 & FIPS 140-3 CAVP Check Icon Check Icon Check Icon Check Icon
FIPS 140 CMVP FIPS 140-2 & FIPS 140-3 CMVP Check Icon Check Icon Check Icon Check Icon
DPA RSA & ECC & AES DPA Resistance Check Icon
Key Derive Secure Key Derivation Check Icon Check Icon Check Icon Check Icon
Key Agreement ECDH, DH Check Icon Check Icon Check Icon Check Icon
Key Transport Key Wrap Mechanisms Check Icon Check Icon Check Icon Check Icon
Roots Multiple Roots/Key Splits 1 1 1 1
Secure Boot Secure Boot Assist P-256 Check Icon Check Icon Check Icon Check Icon
Secure Debug Secure Debug P-256 Check Icon Check Icon Check Icon Check Icon
TRNG True Random Number Generator SP800-90 Check Icon Check Icon Check Icon Check Icon
RSA-ECC HW Accelerators Check Icon Check Icon Check Icon Check Icon
AES HW Accelerators Check Icon Check Icon Check Icon Check Icon
AES CBC-CTR-CCM-CMAC Mode Check Icon Check Icon Check Icon Check Icon
AES GCM-GMAC-XTS Mode Check Icon Check Icon Check Icon
SM2-3-4 HW Accelerators Check Icon Check Icon
SHA-2 (HMAC-)SHA-2 Accelerators Check Icon Check Icon Check Icon Check Icon
SHA-2 (HMAC-)SHA-2 Max Mode 256 512 512 512
SHA-3 (HMAC-)SHA-3 Accelerators Optional Optional Optional
SHA-3 (HMAC-)SHA-3 Max Mode 512 512 512
CPP ChaCha Poly Accelerators Optional Optional
ARIA HW Accelerators Optional Optional
3DES HW Accelerators Optional Optional
Performance Crypto & Hash Performance Gbps 1 2 2 2
I/O Bus AXI or AHB AMBA Interface Check Icon Check Icon Check Icon Check Icon
OTP TCM OTP Management Interface Check Icon Check Icon Check Icon Check Icon
The Road to Post Quantum Cryptography cover

The Road to Post Quantum Cryptography

Quantum computing offers the promise of tremendous leaps in processing power over current digital computers. But for the public-key cryptography algorithms used today for e-commerce, mobile payments, media streaming, digital signatures and more, quantum computing represents an existential event. Quantum computers may be able to break the widely used RSA and ECC (Elliptic-Curve Cryptography) algorithms in as little as days. Learn about our solutions and recommendations to ready customers for a post-quantum world.