Secure Hardware and IP Solutions

High performance security, cryptography, and signal processing IP cores

Protect mission-critical technologies at chip scale.

Defense and aerospace, vehicle safety, networking and communications, satellite, cellular base station and handset systems, and the Internet of Things (IoT) have a singular need: proven, reliable security.

In today's environments where wrongful access to sensitive data is pursued non-stop, implementing the most rugged security, cryptography and signal processing IP cores is the most effective way to safeguard FPGAs and SoC designs within high-value, mission-critical solutions.

Whether built into Mercury processing hardware or integrated as a standalone product into any FPGA-hosted system, state-of-the-art system security is the only defense against the relentless cyber and physical attacks.

Explore Supporting Mercury Hardware with BuiltSECURE

HDS6705 6U OpenVPX, SOSA-aligned, Multiprocessing Board, BuiltSECURE

HDS6705 6U OpenVPX, SOSA-aligned, Multiprocessing Board, BuiltSECURE

SEE MORE

LDS3507 3U OpenVPX, CMOSS/SOSA-aligned, Single Board Computer

LDS3507 3U OpenVPX, CMOSS/SOSA-aligned, Single Board Computer

SEE MORE

LDS6708 6U OpenVPX, SOSA-aligned, Single Board Computer, BuiltSECURE

LDS6708 6U OpenVPX, SOSA-aligned, Single Board Computer, BuiltSECURE

SEE MORE

RTBX06 Rugged Trusted BuiltSECURE Servers

RTBX06 Rugged Trusted BuiltSECURE Servers

SEE MORE

RTBX05 Rugged Trusted BuiltSECURE Servers

RTBX05 Rugged Trusted BuiltSECURE Servers

SEE MORE

Embedded Processing Subsystems

Embedded Processing Subsystems

SEE MORE

What is BuiltSECURE™ Technologies

Proven and ready for deployment in the most hostile locations at the tactical edge, BuiltSECURE technology protects critical data and enhances cybersecurity with industry leading physical security, cryptography, and secure boot features. Trusted by leading FPGA manufactures in their products, BuiltSECURE system security engineering (SSE) IP is built-in, not bolted on, to deliver secure processing performance that protects sensitive algorithms and data—even if the platform is compromised.

Easily Spot Anomalies

Personalize your security solution by creating a fingerprint for your FPGA device. Using the inherent differences found in each FPGA silicon, Phantom Black FPGA IP asymmetric physically unclonable function (PUF) creates a unique idenitifier that protects secure deployed keystores or provides trusted identification for each initialization cycle of your application. This proven, reliable system integrity and security is available integrated into Mercury processing solutions or as a standalone capability in any system that leverages FPGA technologies. Want to learn more? Discuss your specific needs with a security expert today.

Stay Ahead of Threats

Mitigate reverse engineering and safeguard against threats with features from our proven technology suite including:

 

REQUEST AN ON-SITE BRIEFING

• Commercial National Security Algorithm (CNSA)/Suite B ciphers
    - AES 128/256 all modes
    - SHA2 and SHA3
    - RSA
    - ECDSA/ECDH
    - TRNG
• NIST CAVP certifiable
• Inline memory
• Encryption/decryption
• Random generator
• Side channel countermeasures
• Physical protection mechanisms
• Key management
• Data-at-rest protection

MLT_ServerRoom_TwoPeople_Monitor.jpg

Security Services and Analysis

Mercury’s experienced system security engineers and customer support teams deliver affordable, end-to-end product security services including vulnerability assessments, technical training, classified capabilities and product-specific protection schemes. We can provide cybersecurity partner pre-integration, program protection planning assistance and red team/blue team vulnerability analysis.

Case Study

Maintaining System Integrity in a Dynamic Environment

Challenge: Establish trust at the hardware level to circumvent adversaries striking at the lowest possible level in software.

Solution: Integrate advanced cryptography solutions that defend FPGA and ASIC architectures against side-channel attacks and exposure of sensitive cryptographic keys during system boot and runtime.

Result: Defense-ready cryptography protects foundational silicon building blocks that underlie key processing elements. Critical information in current and post-quantum future digital systems is constantly secure and protected from local and remote attacks as well as key breaking.

DISCOVER MORE