Future Electronics Hardware Security SolutionsFuture Electronics offers a variety of hardware IC security solutions that provide you with the key building blocks you need to secure data at rest or in motion in your system. Future Electronics provides development kits and reference designs to get you started, along with expert services of engineering specialists dedicated to helping you get your design to production quickly.
|
Hardware Security Device Types
Secure Elements and Authenticators
Secure elements and authenticators may be used together with any MCU/MPU and offer a range of benefits with features that may include secure key storage, asymmetric and symmetric authentication, tamper resistance, clone prevention, trust provisioning and random number generation.
Featured Products
+
Trusted Platform Modules (TPMs)
Trusted Platform Modules protect the integrity and authenticity of computer/server systems and other embedded systems. They feature secured key storage and support for a variety of encryption algorithms. Based on Trusted Computing Group (TCG) standards.
Featured Products
+
Secure MCUs
Secure MCUs offer a host of security features that may include isolation at the chip level with ARM TrustZone technology to establish root of trust, secure key storage and management, one-time programmable fuses, random number generation, tamper resistance, cryptographic accelerators and secure boot capability.
Featured Products
+
Secure MPUs
MPUs have higher performance than MCUs, offer access to larger external memory and can utilize a rich OS such as Linux. Secure MPUs may include many of the same security features found in secure MCUs, including ARM TrustZone to establish root of trust, secure key storage of management, random number generation, tamper detection, secure boot and one-time programmable fuses, as well as PCI pre-certification, integrated security engines and IPsec / SSL offload.
Featured Products
+
Secure FPGAs
If you require secure data processing but need customization, higher speeds and I/O count, and have multiple tasks that need to be run in parallel, an FPGA is ideal. FPGA security features may include bitstream protection, key management, hardware access controls, root of trust, secure boot, anti-tamper features and cryptoprocessors.
Featured Products
+
Secure PHYs
Ethernet PHYs with AES-256 MACsec (IEEE 802.1AE) Layer 2 encryption support secure data transport over LANs/WANs.
Featured Products
+
Platform Root of Trust (RoT)
In addition to RoT at the device level, a platform RoT (ex. NIST SP 800-193 compliant) device is first on/last off in the system, protecting platform firmware and critical data from corruption, detecting corruption at power-on and after system updates, and recovering firmware if compromised.
Featured Products
+