Trusted Platform Modules (to be delivered)

Our FPGA based Trusted Platform Modules are offered both as IP Core and as a separate chip. We offer two types of TPM:

Regular Trusted Platform Modules

FPGA based Trusted Platform Modules

Quantum-secureness

Native support for post-quantum algorithms, secure against attacks with quantum computers

Flexibility

Large set of supported algorithms (including NIST finalists and customer’s own)
Tunable performance, area and power consumption
Flexible interface in our modules and hardware API

Modular achitecture

Built from modules, allowing different construction for different purposes and wide selection of applied algorithms

Migration support icon

Secure key management

Can generate, protect and store the device keys

Area of application

This TPM is dedicated for every environment, where secure communication, data confidentiality and low latencies are crucial. 
Following markets may benefit in particular from the TPM:

Drones

Secure, post-quantum communication with low encryption latencies. Your drone will never miss any beacon!

Electronics Manufacturers

TPM can be integrated in almost every device performing cryptographic operations to offload the main processing unit and accelerate encryption process

Networking devices

Stronger encryption with better performance for routers and edge devices

Supported algorithms
(the list is being expanded)

AES with various encryption modes
SHA2 and SHA3 familly
TRNG
Kyber and Dilithium (PQC)
ed25519 signatures and DH key exchange
TLS1.3

Communication interfaces

AXI4Stream
AXI4MM
UART
Avalon-MM
SPI
I2C

Enhanced Trusted Platform Modules

The Enhanced TPM is extension of the regular one offering innovative architecture (patent pending) that allows to operate in secure (red) and insecure (black) environments.

It connects both environments and offers strong security for user secret keys and identity, allowing implementation of any service available in black environment that requires access to TPM, without any loss in overall security of stored secrets and red environment. 

Protection against infections

Secures the internal layer from attacks even while connected to infected 3rd party device

Protection against hardware trojans

Provides protection against hardware Trojans on integrated circuits on the internal layer

Communication flexibility

Maintains high communication flexibility providing high funcionality of the device where it is applied

Key backup

Implements methods that allow to recover keys and secrets in case of device theft or lose

Area of application

This solution is dedicated for devices processing critical user data:

Hardware wallets

Authentication devices

Email encryption engines

Digital signature

Password banks

Secure phones and communicators

Supported algorithms
(the list is being expanded)

AES with various encryption modes
SHA2 and SHA3 family
TRNG
Kyber and Dilithium (PQC)
ed25519 signatures and DH key exchange
TLS1.3

Communication interfaces

AXI4Stream
AXI4MM
UART
Avalon-MMSPI
I2C

Logos of European funds