Security IP
These are Security IPs.
These IPs can be used inside a SOC to enable you to implement a Deep Security Infrastructure to secure your –
- Secure your Mission Critical Data like –
- Keys of different cryptography.
- Block access from any ports or IPs or Software other than intended one.
- Enable end to end protection on your data using state of art technologies.
Showing all 7 results
-
Soft Fault Detection IP
Call for price Read moreThe fault detection IP from GreenIPCore incorporates various proprietary soft error detection techniques in the area it is been implemented.
This comprehensive approach ensures the detection of a wide range of soft errors and faults which can result in corruption inducing conditions for the circuit.
-
Fault Resistant Key Vault
Call for price Read more1. Fault Resistant Technology to ensure reliable operation.
2. Uses random scramble to store key.
3. Can store key on memory or flipflop Array .
4. Key Size Supported – 128, 192, 256, 384, 512, 1024, 2048 and 4096-bit key storage.Continue Reading -
Fault Resistant AES Core
Call for price Read more1. Fault Resistant Technology to ensure reliable operation.
2. Compliant to NIST FIPS-197 Advanced Encryption Standard.
3. Can be programmed to encrypt or decrypt a 128-bit blocks.
4. Key Size Supported – 128-bit, 192-bit or 256-bit key.
5. There is parameter option given to select Processing Size.
6. User can select 8bit, 32bit, 64bit and 128bit processing.Continue Reading -
AES Core
Call for price Read more1. Compliant to NIST FIPS-197 Advanced Encryption Standard.
2. Can be programmed to encrypt or decrypt a 128-bit blocks.
3. 128, 192 and 256-bit Key Size Supported .
4. There is parameter option given to select Processing Size.
5. User can select 8bit, 32bit, 64bit and 128bit processing.
6. Ideal solution for low power applications.
7. Minimum logic resources.Continue Reading -
Secure General Purpose Registers
Call for price Read moreGeneral Purpose Resister Built with Data Protection and Redundancy to Store Mission Critical Information in Hidden and Secure Way.Continue Reading
-
AMBA-AHB Security
Call for price Read more- Completely Hides the Transactions. No Power Profiling is possible.
- Hides the Data Completely from Debug by changing Key periodically.
- Self managed key. Can be randomized further across devices using Random Number generators.
- Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.
-
AMBA-AXI Security
Call for price Read more- Completely Hides the Transactions. No Power Profiling for SPA and DPA is possible once this IP is implemented on SOC.
- Hides the Data Completely from Debug by changing Key periodically.
- Self managed key. Can be randomized further across devices using Random Number generators.
- Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.