Artosyn Selects Synopsys DesignWare Security IP for Drone SoC
Comprehensive Security IP Solution with Hardware Root of Trust Delivers High Level of Protection During SoC Power Off, Power Up, and Runtime
Highlights:
- DesignWare tRoot Hardware Secure Module with Root of Trust protects sensitive information within an SoC
- Multi-stage secure boot validates software and data integrity of the host CPU
- Public key, symmetric and hash cryptography accelerators provide up to 100x increased performance compared to software-only implementations
- Standards-compliant True Random Number Generator, certified in customer field deployments, provides the foundation of protection against malicious attacks
Synopsys, Inc. (Nasdaq :SNPS ) today announced that Artosyn Microelectronics, a leading supplier of drone system-on-chips (SoCs) in China, has adopted the DesignWare® tRoot™ Hardware Secure Module (HSM) with Root of Trust, True Random Number Generator (TRNG) and cryptography accelerators for its latest drone SoC. After evaluating other vendors, Artosyn selected Synopsys DesignWare Security IP due to its high level of protection against threats and tampering during SoC power off, power-up, and runtime phases, including communications with other devices.
Read More: Interview with David Sikora, Chief Executive Officer at ALTR
“In our fast-moving, dynamic markets, bringing differentiated solutions that can withstand evolving security threats is critical to our success,” said Bo Shen, chief technology officer of Artosyn. “Synopsys’ DesignWare tRoot HSM with cryptographic accelerators provides all of the security functions we need, enabling us to add high-grade security to our SoC quickly and bring robust solutions to market faster.”
The tRoot HSM provides SoC-level runtime tamper detection and response, as well as code privacy protection without the added cost of more secure memory. The tRoot HSM’s encrypted and authenticated firmware resides in any non-secure memory space, reducing system complexity and cost. The TRNG combines a whitening circuit with a noise source that provides automatic seeding of the random number stream and an ongoing source of entropy to the core.
Read More: The Promise and Potential of AI for the Insurance Industry
The RSA, ECC, AES and SHA hardware cryptography accelerators accelerate asymmetric, symmetric, and hash cryptography required in security protocols to reach performance and energy efficiency levels that are not achievable in software-only solutions.
“As security threats continue to emerge in a wide range of applications, such as drones and surveillance, designers need to incorporate high-grade security that protects the SoC at all levels of operation and meets the highest performance standards,” said John Koeter, vice president of marketing for IP at Synopsys. “By providing comprehensive, silicon-proven security IP, Synopsys enables companies such as Artosyn to create differentiated products and deploy them quickly and with less risk.”
Read More: Oracle Retail Recognized as a Leader in Point of Service in Independent Research Report
Copper scrap reclamation methods Copper scrap processing technology Scrap metal regenerating facility
Copper cable market, Metal recycling recovery yard, Copper scrap prices per pound