Root-of-Trust
Designed to be integrated in power constrained microcontroller or complex SoC, Inside Secure Root-of-Trust Engine is the vault that guards the chip most sensitive assets and that establishes the platform security foundations.
Verimatrix and Inside Secure have merged. Learn more here. Go to Verimatrix website.
In an System-On-Chip(SoC), Inside Secure Root-of-Trust is the module that guards your systems security sensitive assets, a vault locked from the inside.
Designed to be integrated in power constrained microcontroller or complex SoC, Inside Secure Root-of-Trust Engine is the vault that guards the chip most sensitive assets and that establishes the platform security foundations.
Acting as a vault in the SoC, Inside Secure Programmable Root-of-Trust is a flexible and customizable module that hosts and protects the execution of the platform most sensitive applications.
We enable faster cryptographic processing in your SoC or device
Inside Secure’s cryptographic algorithm accelerator IP cores are standalone hardware IP cores for accelerating various symmetric, asymmetric ciphers, HASH and HMAC-based integrity algorithms, as well as true random number generators (TRNG). Vault IP cryptographic engines can be used for accelerating applications for storage, LTE, PKI/PKA infrastructure, HDCP.
We secure your network without altering traffic
Inside Secure offers complete inline solutions that seamlessly integrate with your network interface and look-aside engines, offloading the system CPUs and accelerating L3/L4 security protocols, linux crypto APIs and more.
We secure your network without altering traffic
A complete solution comprising of a family of MACsec Security IPs and a MACsec software toolkit targeting PHY devices, switches, bridges and routers for Layer 2 LAN and Metro Ethernet communications. The MACsec engines target deployments in data centers, 5G base stations, enterprise networks, home gateways and more.
We secure internet communication from application to networks and clouds.
The Multi-Protocol Engine IPs offer acceleration of IPsec, MACsec, SSL/TLS/DTLS, sRTP and basic hash-crypto operations at target speeds ranging from 100Mbps to 100Gbps, in architectures ranging from the traditional look-aside engines to the more sophisticated, powerful inline packet engines.
Intelligent packet engines contain complete protocol knowledge, delivering the benefits of throughput acceleration and CPU offload.
The PKI-IP-154 (EIP-154) is a family of IP cores designed for full scalability and an optimal performance over gate count ratio. The PKI-IP-154 implements a farm of PKA-IP-28 public key accelerators to address the needs very high key generation and key exchange solutions. The PKA-IP-154 can be deployed in any semiconductor design that needs key exchange or key generation at extreme high performance. The PKI-IP-154 public key accelerators combine an array of PKA-IP-28, TRNG-IP-76 with an AMBA interface such as AXI or AHB.
We keep your design secrets away from counterfeiters
SypherMedia Library (SML) Circuit Camouflage Technology protects integrated circuits against Reverse Engineering and Cloning.