Security Icon


CryptoManager Root of Trust RT-730

The CryptoManager Root of Trust RT-730 is a fully-programmable, ISO-26262-ready hardware security core offering security by design for automotive applications. It protects against a wide range of attacks with state-of-the-art anti-tamper and security techniques.

As the connected nature of automobiles evolves, device architects face a growing array of emerging security threats. Whether V2X, ADAS, infotainment, or other applications, one constant in automotive design is the need for a hardware root of trust-based security implementation. The Rambus RT-730 is the ideal security co-processor for automotive uses. Based on a custom 32-bit RISC-V siloed and layered secure co-processor, along with dedicated secure memories, the RT-730 features a number of high-capability cryptographic accelerators like AES-AE-16, HMAC 512 & SHA-2, RSA 4K, ECC 521, Fast DMA, Whirlpool and a NIST compliant Random Bit Generator. Additionally, the RT-730 is ASIL-D ready. Satisfying use cases such as secure boot, EVITA HSM, and protection of propriety algorithms, the ISO-26262-ready RT-730 is ideally suited for automotive applications where security is imperative.

How the Root of Trust Works

The CryptoManager Root of Trust is an independent hardware security co-processor for integration into semiconductor devices, offering secure execution of user applications, tamper detection and protection, and secure storage and handling of keys and security assets. The Root of Trust offers chipmakers a siloed approach to security; while located on the same silicon as the main processor, the secure processing core is physically separated. A layered security approach enforces access to crypto modules, memory ranges, I/O pins, and other resources, and assures critical keys are available through hardware only with no access by software.

CryptoManager Root of Trust diagram

Offering true multiple root of trust capabilities, each individual application can be assigned its own unique keys, meaning permissions and access levels are set completely independent of others. OEMs can determine access levels and permissions for each and all processes operating within the secure processor. Applications are siloed from each other, ensuring the best approach to security.

Included with the RT-730 Hardware Root of Trust are a series of standard secure applications (“containers”) to speed development, including secure boot, identity management, HSM reference, and others. A container development kit is also included to allow the development of custom containers for specific use cases.

Part of the comprehensive CryptoManager Security Platform that includes embedded cores, key provisioning infrastructure and infield services, the Root of Trust provides the highest level of end-to-end security at all stages of the chip lifecycle.

Full Disk Encryption of Solid State Drives and Root of Trust Cover

Full Disk Encryption of Solid State Drives and Root of Trust

File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security features are key to securing FDE implementation.

Related Markets & Applications

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation