You are here:
Root of Trust
The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage
ICTK provides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage
查看 Root of Trust 详细介绍:
- 查看 Root of Trust 完整数据手册
- 联系 Root of Trust 供应商
Root of Trust IP
- RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
- RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-640 Embedded Hardware Security Module (HSM) for Automotive ASIL-B
- RT-645 Embedded Hardware Security Module (HSM) for Automotive ASIL-D
- RT-120 Compact Root of Trust for IoT and IIoT, sensors and gateways
- RT-121 Compact Root of Trust for IoT and IIoT, sensors and gateways for China market