Protect mission-critical technologies at chip scale.
In today's environments where wrongful access to sensitive data is pursued non-stop, implementing the most rugged security, cryptography and signal processing IP cores is the most effective way to safeguard FPGAs and SoC designs within high-value, mission-critical solutions.
Whether built into Mercury processing hardware or integrated as a standalone product into any FPGA-hosted system, state-of-the-art system security is the only defense against the relentless cyber and physical attacks.
Explore Hardware-Agnostic Software and IP Solutions
SecRun
Integrated security platform utilizes a combination of proven, secure IP technologies to counteract threats to sensitive data
Phantom Black
Asymmetric physically unclonable function (PUF) creates a unique 'fingerprint' to protect a secure keystore or provide device identification
Design Assistance
Affordable, end-to-end product security services that protect sensitive data and technologies with system security engineering (SSE)
Explore Supporting Mercury Hardware with BuiltSECURE

HDS6705 6U OpenVPX, SOSA-aligned, Multiprocessing Board, BuiltSECURE

LDS3507 3U OpenVPX, CMOSS/SOSA-aligned, Single Board Computer

LDS6708 6U OpenVPX, SOSA-aligned, Single Board Computer, BuiltSECURE

RTBX06 Rugged Trusted BuiltSECURE Servers

RTBX05 Rugged Trusted BuiltSECURE Servers

Embedded Processing Subsystems
Thank you! We have received your message and will be in touch with you shortly.
Easily Spot Anomalies
Personalize your security solution by creating a fingerprint for your FPGA device. Using the inherent differences found in each FPGA silicon, Phantom Black FPGA IP asymmetric physically unclonable function (PUF) creates a unique idenitifier that protects secure deployed keystores or provides trusted identification for each initialization cycle of your application. This proven, reliable system integrity and security is available integrated into Mercury processing solutions or as a standalone capability in any system that leverages FPGA technologies. Want to learn more? Discuss your specific needs with a security expert today.
Stay Ahead of Threats
Mitigate reverse engineering and safeguard against threats with features from our proven technology suite including:
• Commercial National Security Algorithm (CNSA)/Suite B ciphers
- AES 128/256 all modes
- SHA2 and SHA3
- RSA
- ECDSA/ECDH
- TRNG
• NIST CAVP certifiable
• Inline memory
• Encryption/decryption
• Random generator
• Side channel countermeasures
• Physical protection mechanisms
• Key management
• Data-at-rest protection

Security Services and Analysis
Mercury’s experienced system security engineers and customer support teams deliver affordable, end-to-end product security services including vulnerability assessments, technical training, classified capabilities and product-specific protection schemes. We can provide cybersecurity partner pre-integration, program protection planning assistance and red team/blue team vulnerability analysis.
Case Study
Maintaining System Integrity in a Dynamic Environment
Challenge: Establish trust at the hardware level to circumvent adversaries striking at the lowest possible level in software.
Solution: Integrate advanced cryptography solutions that defend FPGA and ASIC architectures against side-channel attacks and exposure of sensitive cryptographic keys during system boot and runtime.
Result: Defense-ready cryptography protects foundational silicon building blocks that underlie key processing elements. Critical information in current and post-quantum future digital systems is constantly secure and protected from local and remote attacks as well as key breaking.