Designed to be integrated in power and space-constrained SoCs or FPGAs, the RT-100 Root of Trust (formerly VaultIP) is a FIPS 140-2 compliant hardware core that guards the most sensitive assets on chips and establishes the foundation for platform security.
Featuring a state-machine architecture with dedicated secure memories, the RT-100 hardware Root of Trust provides a variety of cryptographic accelerators including AES, SHA-2 and ECC. Ideal for power and space-sensitive applications like IoT, edge nodes, and sensors. The RT-100 Root of Trust offers the best balance of size and performance available on the market with optional FIPS 140 CAVP and CMVP.
The RT-100 offers a series of key security use cases ‘out of the box’, including:
The RT-100 provides a secure asset store:
The RT-100 Root of Trust is a silicon IP core developed to protect an SoC platform and its operation. It allows the SoC to boot securely and protects sensitive key material and assets. At its heart, its Secure Asset Store secretly generates keys and securely stores them. Fully featured, its cryptographic data plane associated to its DMA offloads the main CPU while never exposing secret data to the OS or the applications. It is designed to provide secure, energy efficient and accelerated security functions.
Readily deployable, the RT-100 Root of Trust is offered in off-the-shelf configurations, allowing a choice tailored to the needs of your application. Configurations differ by cryptographic accelerators contained and 3rd-party certification and standard compliance.
The RT-100 is part of the broad Rambus Root of Trust portfolio, which ranges from small, lightweight cores designed to protect IoT endpoints all the way to fully programmable Root of Trust cores designed to protect the most sensitive government/defense chips and automotive deployments requiring ISO-26262 certifications.
Quantum computing offers the promise of tremendous leaps in processing power over current digital computers. But for the public-key cryptography algorithms used today for e-commerce, mobile payments, media streaming, digital signatures and more, quantum computing represents an existential event. Quantum computers may be able to break the widely used RSA and ECC (Elliptic-Curve Cryptography) algorithms in as little as days. Learn about our solutions and recommendations to ready customers for a post-quantum world.
|FIPS 140 CAVP||FIPS 140-2 CAVP & FIPS 140-3 CAVP (2020)||Optional|
|FIPS 140 CMVP||FIPS 140-2 CMVP & FIPS 140-3 CMVP (2020)||Optional|
|AES HW||ECB, CBC, CTR Modes – Max Key Size (bits)||256|
|HMAC-SHA2 HW||SHA-2 and HMAC-SHA2 – Max SHA-2 Mode (bits)||256|
|Public Key Engine||RSA, ECC Acceleration Core||16×16|
|ECC HW||Max Curve Size (bits)||521|
|RSA HW||Max Exponent Size (bits)||3096|
|Random Number Generator HW||NIST SP800 compliant TRNG||Standard|
|I/O Performance||Throughput (Gbps)||1|
|Crypto Performance||Crypto/Hash Performance (Gbps) @500MHz||1|
|DMA||Standard (STD) or Multi-channel (MC)||STD|
|I/O Bus||AMBA Bus Master/Slave||AXI/AHB|
|OTP Interface||Interface to 3rd-Party OTP||TCM|
|Multiple Roots of Trust||Roots/Key Splits||1|