Trusted Platform Modules (to be delivered)
Our FPGA based Trusted Platform Modules are offered both as IP Core and as a separate chip. We offer two types of TPM:
FPGA based Trusted Platform Modules
Quantum-secureness
Native support for post-quantum algorithms, secure against attacks with quantum computers
Flexibility
Large set of supported algorithms (including NIST finalists and customer’s own)
Tunable performance, area and power consumption
Flexible interface in our modules and hardware API
Modular achitecture
Built from modules, allowing different construction for different purposes and wide selection of applied algorithms
Secure key management
Can generate, protect and store the device keys
This TPM is dedicated for every environment, where secure communication, data confidentiality and low latencies are crucial.
Following markets may benefit in particular from the TPM:
Drones
Secure, post-quantum communication with low encryption latencies. Your drone will never miss any beacon!
Electronics Manufacturers
TPM can be integrated in almost every device performing cryptographic operations to offload the main processing unit and accelerate encryption process
Networking devices
Stronger encryption with better performance for routers and edge devices
Supported algorithms
(the list is being expanded)
AES with various encryption modes
SHA2 and SHA3 familly
TRNG
Kyber and Dilithium (PQC)
ed25519 signatures and DH key exchange
TLS1.3
Communication interfaces
AXI4Stream
AXI4MM
UART
Avalon-MM
SPI
I2C
The Enhanced TPM is extension of the regular one offering innovative architecture (patent pending) that allows to operate in secure (red) and insecure (black) environments.
It connects both environments and offers strong security for user secret keys and identity, allowing implementation of any service available in black environment that requires access to TPM, without any loss in overall security of stored secrets and red environment.
Protection against infections
Secures the internal layer from attacks even while connected to infected 3rd party device
Protection against hardware trojans
Provides protection against hardware Trojans on integrated circuits on the internal layer
Communication flexibility
Maintains high communication flexibility providing high funcionality of the device where it is applied
Key backup
Implements methods that allow to recover keys and secrets in case of device theft or lose
This solution is dedicated for devices processing critical user data:
Hardware wallets
Authentication devices
Email encryption engines
Digital signature
Password banks
Secure phones and communicators
Supported algorithms
(the list is being expanded)
AES with various encryption modes
SHA2 and SHA3 family
TRNG
Kyber and Dilithium (PQC)
ed25519 signatures and DH key exchange
TLS1.3
Communication interfaces
AXI4Stream
AXI4MM
UART
Avalon-MMSPI
I2C
