Secure-IC provide Chip Security Protection IP Cores: Cryptographic algorithm IP such as AES, DES, 3-DES, ECC, RSA, SM2, SM3, SM4, SHA1, SHA2, SHA3, HMAC, countermeasure IP such as TRNG, CTR-DRBG RNG, Digital Sensor, Active Shield, PUF, Smart Monitor, Scrambled Bus, Memory Ciphering, Cyber CPU, Secure Clock, Secure Book, Secure Monitor, Secure JTAG, etc.
Authentication System to Secure the debugging channel on chip, Anti JTAG Violation.
Digital
Authentication System to Secure the debugging channel on chip, Anti JTAG Violation., Digital
1. GLOBAL OVERVIEW
The Joint Test Action Group (JTAG) is the IEEE1149.1 Standard Test Access Port (TAP) and Boundary-Scan Architecture.
Giving a full access to the internal system components of the device, the TAP interface is a backdoor for hackers. Secure-IC offers a set of tools to secure the access to the device: Secure Test Access Port (STAP)
Properties
• Fully compliant with the standard
• Relies on modules, if any, existing in the design
• Fully customizable to match security needs
STAP authentication process
• Challenge-response authentication protocol
• Random challenge to prevent the replay attacks
• Cryptographic module
• Database (users privileges, private keys)
Secure-IC provide various security IP cores as following list (keep updating).
AES | Encryption, against Side-Channel Attacks |
DES / 3-DES | Encryption, against Side-Channel Attacks |
RSA | Encryption, against Side-Channel Attacks |
ECC | Encryption, against Side-Channel Attacks |
HASH (SHA-1/MD-5) | Encryption, against Side-Channel Attacks |
SM2 | Encryption, against Side-Channel Attacks |
SM3 | Encryption, against Side-Channel Attacks |
SM4 | Encryption, against Side-Channel Attacks |
TRNG | True Random Number Generator,Digital,against Harmonic EM Attacks |
PUF | Digital, Anti Cloning/Counterfeiting,100% Unique, Random and Steady ID Generation |
Digital Sensor | Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital |
Active Shield | Active Protection against Intrusive Attacks on ASIC, Anti Intrusive Hardware Modification. |
Scrambled BUS | Encrypted Information to Prevent Probing on BUS, Anti Eavesdroping |
Memory Ciphering | Memory Protection Against Reverse Engineering and Tampering |
Secure Clock | Anti Synchronization to prevent efficient SCA and FIA |
Secure JTAG | Authentication System to Secure the debugging channel on chip, Anti JTAG Violation |
Secure Boot | Maximum security-enabling root-on-trust, Anti Firmware Tampering |
Secure Monitor | Maximum security-enabling monitoring, Security policy bypass |
CyberCPU CPU | CPU-agnostic Cyber Attack Sensor |
Current Products:Security IP: Secure JTAG