Secure Hardware and IP Solutions
High performance security, cryptography, and signal processing IP cores
High performance security, cryptography, and signal processing IP cores
Defense and aerospace, vehicle safety, networking and communications, satellite, cellular base station and handset systems, and the Internet of Things (IoT) have a singular need: proven, reliable security.
In today's environments where wrongful access to sensitive data is pursued non-stop, implementing the most rugged security, cryptography and signal processing IP cores is the most effective way to safeguard FPGAs and SoC designs within high-value, mission-critical solutions.
Whether built into Mercury processing hardware or integrated as a standalone product into any FPGA-hosted system, state-of-the-art system security is the only defense against the relentless cyber and physical attacks.
Integrated security platform utilizes a combination of proven, secure IP technologies to counteract threats to sensitive data
Asymmetric physically unclonable function (PUF) creates a unique 'fingerprint' to protect a secure keystore or provide device identification
Affordable, end-to-end product security services that protect sensitive data and technologies with system security engineering (SSE)
Thank you! We have received your message and will be in touch with you shortly.
Personalize your security solution by creating a fingerprint for your FPGA device. Using the inherent differences found in each FPGA silicon, Phantom Black FPGA IP asymmetric physically unclonable function (PUF) creates a unique idenitifier that protects secure deployed keystores or provides trusted identification for each initialization cycle of your application. This proven, reliable system integrity and security is available integrated into Mercury processing solutions or as a standalone capability in any system that leverages FPGA technologies. Want to learn more? Discuss your specific needs with a security expert today.
Mitigate reverse engineering and safeguard against threats with features from our proven technology suite including:
• Commercial National Security Algorithm (CNSA)/Suite B ciphers
- AES 128/256 all modes
- SHA2 and SHA3
- RSA
- ECDSA/ECDH
- TRNG
• NIST CAVP certifiable
• Inline memory
• Encryption/decryption
• Random generator
• Side channel countermeasures
• Physical protection mechanisms
• Key management
• Data-at-rest protection
Mercury’s experienced system security engineers and customer support teams deliver affordable, end-to-end product security services including vulnerability assessments, technical training, classified capabilities and product-specific protection schemes. We can provide cybersecurity partner pre-integration, program protection planning assistance and red team/blue team vulnerability analysis.
Challenge: Establish trust at the hardware level to circumvent adversaries striking at the lowest possible level in software.
Solution: Integrate advanced cryptography solutions that defend FPGA and ASIC architectures against side-channel attacks and exposure of sensitive cryptographic keys during system boot and runtime.
Result: Defense-ready cryptography protects foundational silicon building blocks that underlie key processing elements. Critical information in current and post-quantum future digital systems is constantly secure and protected from local and remote attacks as well as key breaking.