²ÝÁñÉçÇø

Secure PCIe 7.0/6.x/5.0 Interfaces with IDE Security Modules

²ÝÁñÉçÇø Secure PCIe 7.0, 6.x, and 5.0 Controllers with integrated Integrity and Data Encryption (IDE) Modules help designers protect data transfer in their SoCs against tampering and physical attacks. The standards-compliant IDE Security Modules are designed and validated with ²ÝÁñÉçÇø Controllers to accelerate SoC integration, offering confidentiality, integrity, and replay protection. The IDE Security Modules for PCIe offer seamless integration with the ²ÝÁñÉçÇø Controllers, support scalable data bus widths and lanes configurations and multiple streams, and are optimized for area, performance and latency. ²ÝÁñÉçÇø PCIe Controllers with IDE enable designers to build full TDISP support in their hyperscale SoCs and mitigate against data and system attacks to address the challenges of the modern virtualized cloud security landscape.

Secure CXL 3.x/2.0 Interfaces with IDE Security Modules

²ÝÁñÉçÇø Secure CXL 3.x and 2.0 Controllers, integrated with configurable, standards-compliant Integrity and Data Encryption (IDE) Security Modules for CXL, help designers protect data transfer in their SoCs against tampering and physical attacks. The IDE Security Modules provide confidentiality, integrity, and replay protection for FLITs in the case of CXL.cache and CXL.mem protocols for containment and skid modes, and for Transaction Layer Packets (TLP)/FLITs in the case of CXL.io. They match the data interfaces bus widths and lanes configurations of the controllers and are optimized for area, performance and latency (as low as zero cycles for CXL .cache/.mem skid mode).

Secure DDR/LPDDR Interfaces with IME Security Modules

²ÝÁñÉçÇø Secure DDR and LPDDR Controllers with integrated Inline and Memory Encryption (IME) Security Module, support data confidentiality with standards-compliant independent cryptographic support for read/write channels, per region encryption/decryption and are highly optimized for area, performance and latency. The encryption/decryption latency overhead for the ²ÝÁñÉçÇø secure memory controllers is as low as 2 clock cycles. 

Secure HDMI and DisplayPort Interfaces with HDCP 2.3 Embedded Security Modules

²ÝÁñÉçÇø secure HDMI and DisplayPort Controllers integrated with highly efficient High-Definition Content Protection (HDCP) 2.3 Embedded Security Modules (ESM) are designed to protect premium audio-visual content against unauthorized copying, interception, and tampering while meeting stringent security specification requirements. The certified ESMs pre-integrated with ²ÝÁñÉçÇø controllers, enforce the protection of sensitive information to ensure that it is stored, processed, and accessed only by authorized applications. The ESMs are compact, energy efficient, and can be configured to accommodate different high-resolution, uncompressed content streams, such as HD and Ultra HD, as well as can support 1, 2, or 4 ports and multiple protocols.

Secure Mobile Storage Interfaces with Inline Encryption and Advanced RPMB

To protect against data attacks, UFS and eMMC standards include complete security features such as inline encryption (IE) and advanced replay protection memory block (RPMB). To meet the demand for encryption of data stored on the smartphone’s local storage, ²ÝÁñÉçÇø supports inline encryption/decryption in UFS and eMMC IP solutions. In addition to inline encryption/decryption, ²ÝÁñÉçÇø’ UFS Controller supports RPMB, which protects memory blocks through authentication to prevent replay attacks. The highly efficient AES-XTS encryption/decryption with 128 and 256-bit keys ensure transparency. The internally stored keys are writeable only through secure transfers and cannot be read by software for maximum security.

Secure USB Interfaces with System Authentication and Encryption

USB authentication and encryption are implemented at the system level. Authentication requires a combination of trusted domains for executing secure software, secure storage for keys and certificates, and security accelerators for user-friendly response time. With authentication, the host can authenticate a trusted peripheral such as a keyboard, mass storage device, power supply, allowing pipe setup, providing certain power levels and voltages, enabling security options, and more. ²ÝÁñÉçÇø offers a complete USB IP solution for all generations of USB and users can leverage ²ÝÁñÉçÇø security IP for encryption/decryption and authentication. 

Secure Ethernet Interfaces with MACsec

²ÝÁñÉçÇø MACsec Security Modules secure ethernet traffic against denial-of-service (DoS) attacks, eavesdropping, and man-in-the-middle attacks by supporting confidentiality, integrity, origin authentication, and replay protection in switch, router, and bridge SoCs for cloud computing, 5G, mobile and automotive applications. The standards-compliant full-duplex solutions integrate seamlessly with ²ÝÁñÉçÇø Ethernet MAC & PCS IP, supporting scalable data rates with optimal latency, network prioritization, and diversity for a range of secure Ethernet connections.

Secure MIPI Interfaces with End-to-End Transport Security Module

The MIPI Alliance is applying several security components to the MIPI Automotive SerDes ²ÝÁñÉçÇø (MASS) including image, control, and debug data protection. Image data protection allows sensor image integrity and confidentiality. Control data protection allows integrity and confidentiality for all sensors. Debug data protection allows integrity for read/write debug registers and confidentiality protection for proprietary data. As an active member of the MIPI camera and display working groups and as a member of the Board of Directors, ²ÝÁñÉçÇø is closely monitoring the development of the MIPI security specification and will support all required features.

Secure Die-to-Die Interface with Encryption and Multi-Die System Authentication

Security requirements for die-to-die connectivity and multi-die system authentication are challenges that multi-die system designers must overcome.  The data traveling from a single die to multiple dies integrated in a single package must be protected. The industry is collaborating to define the security standard for protocols such as UCIe. The goal is to only allow encrypted data to interface between dies and for the main core to authenticate the system as well as the generation and exchange of security keys. ²ÝÁñÉçÇø, along with other semiconductor industry leaders, is helping to define and develop a standards-compliant security protocol for multi-die systems.