Security IP

These are Security IPs.

These IPs can be used inside a SOC to enable you to implement a Deep Security Infrastructure to secure your –

  1. Secure your Mission Critical Data like –
    1. Keys of different cryptography.
  2. Block access from any ports or IPs or Software other than intended one.
  3. Enable end to end protection on your data using state of art technologies.

Showing all 6 results

  • Fault Resistant Key Vault

    Call for price
    Read more

    1. Fault Resistant Technology to ensure reliable operation.
    2. Uses random scramble to store key.
    3. Can store key on memory or flipflop Array .
    4. Key Size Supported – 128, 192, 256, 384, 512, 1024, 2048 and 4096-bit key storage.Continue Reading

  • Fault Resistant AES Core

    Call for price
    Read more

    1. Fault Resistant Technology to ensure reliable operation.
    2. Compliant to NIST FIPS-197 Advanced Encryption Standard.
    3. Can be programmed to encrypt or decrypt a 128-bit blocks.
    4. Key Size Supported – 128-bit, 192-bit or 256-bit key.
    5. There is parameter option given to select Processing Size.
    6. User can select 8bit, 32bit, 64bit and 128bit processing.Continue Reading

  • AES Core

    Call for price
    Read more

    1. Compliant to NIST FIPS-197 Advanced Encryption Standard.
    2. Can be programmed to encrypt or decrypt a 128-bit blocks.
    3. 128, 192 and 256-bit Key Size Supported .
    4. There is parameter option given to select Processing Size.
    5. User can select 8bit, 32bit, 64bit and 128bit processing.
    6. Ideal solution for low power applications.
    7. Minimum logic resources.Continue Reading

  • Secure General Purpose Registers

    Call for price
    Read more

    General Purpose Resister Built with Data Protection and Redundancy to Store Mission Critical Information in Hidden and Secure Way.Continue Reading

  • AMBA-AHB Security

    Call for price
    Read more
    • Completely Hides the Transactions. No Power Profiling is possible.
    • Hides the Data Completely from Debug by changing Key periodically.
    • Self managed key. Can be randomized further across devices using Random Number generators.
    • Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.

    Continue Reading

  • AMBA-AXI Security

    Call for price
    Read more
    • Completely Hides the Transactions. No Power Profiling for SPA and DPA is possible once this IP is implemented on SOC.
    • Hides the Data Completely from Debug by changing Key periodically.
    • Self managed key. Can be randomized further across devices using Random Number generators.
    • Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.

    Continue Reading