PUF-based Secure Crypto Coprocessor
The security boundary for PUFcc is quite robust, based on physical separation of hardware, with less vulnerability than a software-only barrier. The on-board PUF is a naturally well-protected source of static entropy, suitable for SoC architects to build a system’s key hierarchy using established key generation and management procedures. In addition, PUFcc’s crypto engines can perform a wide variety of secure operations, such as key exchange, secure boot or TLS (public key validation and signing), authentication (MAC), or key wrapping (again based on the natural randomness inherent to the PUF) and store said wrapped keys to external memory.
查看 PUF-based Secure Crypto Coprocessor 详细介绍:
- 查看 PUF-based Secure Crypto Coprocessor 完整数据手册
- 联系 PUF-based Secure Crypto Coprocessor 供应商
Block Diagram of the PUF-based Secure Crypto Coprocessor
crypto coprocessor IP
- Secure-IC's Securyzr Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
- Secure-IC's Securyzr(TM) Crypto Coprocessor (Standard)
- Secure-IC's Securyzr(TM) Crypto Coprocessor (Compact)
- Secure-IC's Securyzr(TM) Crypto Coprocessor (Premium)
- Upgraded PUF-based Crypto Coprocessor (Compliant with TLS 1.3 / FIPS 186-5)