Products

Root-of-Trust Engine

Root-of-Trust

Designed to be integrated in power constrained microcontroller or complex SoC, Inside Secure Root-of-Trust Engine is the vault that guards the chip most sensitive assets and that establishes the platform security foundations.

Acting as a vault in the SoC, Inside Secure Programmable Root-of-Trust is a flexible and customizable module that hosts and protects the execution of the platform most sensitive applications.

More information

vault SIP logo

Inside Secure Root-of-Trust solution provides the hardware trust anchor, the cryptographic functions, the key management and derivation services, the APIs and the off-chip tools to secure the SoC and the ecosystem it belongs to.

It provides the device with the capability to securely:

  • boot and manage software update
  • execute software and applications
  • control test and debug enablement
  • protect data at reset
  • authenticate and be authenticated
  • communicate

The Root-of-Trust Engine is the ideal component to create an embedded HSM for IoT, automotive, datacenter and governmental applications within an optimized silicon footprint and power envelope.

2 scalable solutions

Root-of-Trust Engine and Programmable Root-of-Trust Engine

The Root-of-Trust Engine provides a rich set of symmetric, asymmetric, hashing and true random number generation (TRNG) services to the OS and applications running on the SoC. Its Secure Asset Store controls the use of keys and enforces authorization policies by identifying service requesters through a combination of hardware signaling and software identity. It gives developers peace of mind that secret data can never be visible to the OS or applications and that sensitive assets can never be extracted off-chip.

RISC-V logo
The Programmable Root-of-Trust Engine features a RISC-V 32-bit CPU and is delivered with its application development framework. It effectively enables developers to extend or customize the Secure Asset Store, the cryptographic algorithms or implement a custom key ladder. Embedded in the SoC, it hosts the platform most sensitive applications such as software update or provisioning components and it further secures TLS communications with the cloud. The programmable engine can also authenticate the images and controls the boot of application CPUs to establish a chain of trust in the SoC.

Root-of-Trust solution

Root-of-Trust solution

Secure Boot and software update

Inside Secure Root-of-Trust Secure Boot Toolkit provides developers with the essential components for securing the SoC boot sequence. The signing tool formats and adds protection layers to the executables to ensure their integrity, authenticity and confidentiality. It ultimately generates the protected images. Developers integrate the Boot Library into the SoC boot loader, optionally adding anti-cloning and anti-rollback protections.

Differentiate through security and reduce your time to market

FIPS 140-2 logo
Inside Secure Root-of-Trust Engine is the first FIPS 140-2 level 2 validated silicon IP (certificate #2272 – registered as VaultIP) that tightly combines a rich set of cryptographic services together with a Secure Asset Store within a clearly identifiable physical entity that minimizes the attack surface.

Inside Secure customers can apply for incremental revalidation of their chip. While full FIPS-140-2 Level 2 validation typically takes a year to achieve, revalidation using the initial validation as a base allows for process efficiencies by both the laboratory and NIST, and significantly reduces the time and cost.

Built-in provisioning and device lifecycle

Securing devices requires SoCs to be provisioned with assets such as unique identifiers, keys or certificates. This can be achieved at various stages in the device lifecycle: during the chip manufacturing, the device integration or in the field, and may be a multi-stop process. Inside Secure Root-of-Trust Engine provides built-in capabilities that facilitates the implementation of a secure provisioning scheme with policies configurable based on the device lifecycle.

While consumer IoT, automotive, data centers, smart metering and other applications have all different set of requirements and because one size does not fit all, Inside Secure Root-of-Trust Engine isavailable in a wide range of configurations allowing for size-feature-performance trade-offs. For instance, Chacha20 and Poly1305 support be added on top of the commonly used AES and SHA2 algorithms. Bus interfaces can also be interchanged for a smooth integration into the SoC architecture.

Layered defenses

Beyond software attacks, connected devices may be subject to side channel attacks that exploit the power or electromagnetic signature generated by the cryptographic operations to extract key values. Furthermore, semi-invasive or invasive attacks can attempt to compromise the device behavior and secrets.

DPA countermeasures logo
Inside Secure Root-of-Trust Engine optionally implements additional protection to defend against these classes of attacks. Inside Secure protected cryptographic engines are equipped with proven countermeasures that defeat side channel attacks. Inside Secure Root-of-Trust Engine also optionally provides fault detection along with a configurable anti-tampering manager that implements the response policies.