The state-of-the-art SoC cybersecurity solution for software-defined vehicles
Your benefits
Fast and flexible
Fully configurable solution, integrable with POSIX and real time operating systems.
Comprehensive
Encapsulates all required functions needed to satisfy OEM automotive security requirements.
Reliable quality
Developed to high quality standards (ASPICE, ISO-21434 CSMS, ISO-26262 ASIL B).
Optimized cybersecurity for powerful on-vehicle computing platforms
Features
ESCRYPT CycurSoC: the de-facto standard for µP-based SoC
- Implements security functionality that is critical to the creation of a security enclave on the HSM core or TEE host
- Offers cryptographic protocols and algorithms to the application
- Helps to effectively fulfill complex automotive OEM security requirements, while ensuring a smooth integration into the overall system architecture
- Retains integrity of data and functionality to achieve reliability, safety, and data protection
- Abstracted from the requirements of an OEM and the underlying silicon, making it possible to source one cost-saving security solution that fits all
Cryptographic features
- CMAC and HMAC
- Hashing
- Key derivation
- TRNG and PRNG
- Digital signature algorithms; ECDSA, EdDSA, RSA
- Symmetric and asymmetric encryption
- Authenticated encryption and decryption
- HE+ support
- Key exchange algorithms; ECDH, ECDHE, ECBD
- Key wrapping and transport
- Key encapsulation mechanism (KEM)
- Key storage management and trust management
- Certificate handling
- Parsing
- Signing request
- Revocation and CRL handling
- Chain verification
HSM & host core
- Secure storage of data and keys in external flash
- Secure access
- Establishes trusted channel amongst different cores on the SoC
- Support for E/E architectures with large number of keys
- Support for multi-CPU tenancy
- Support for virtualized environment
- Responsive operations in multi-CPU use cases
- HSM lifecycle mode
- Support for secure boot, trusted boot, authenticated boot, and other boot modes
- Trust anchor based on signatures
- Runtime manipulation detection
Trust zone
- Integration with TEE operating systems
- Establishes trusted channel between trust zone and other cores on the SoC
- Automotive grade security functionality, supporting trusted applications (TA) and the non-secure world
Contact us
Do you have any questions? Feel free to send us a message. We will be more than happy to help.
Contact us today!