We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X

Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models. 

Explore Our Portfolio of Security Products


Platform Root of Trust Controllers

  • Joint Interpretation Library (JIL) Enhanced-Basic rating
  • Real-time SPI Flash monitoring
  • Device and firmware attestation
  • Commercial National Security Algorithm (CNSA) secure boot with P-384 elliptic curve
  • Physically Unclonable Function (PUF) for advanced key generation
  • Transfer of ownership features
  • Secure provisioning via Hardware Secure Modules (HSMs) 
  • Custom Soteria-G3 firmware that meets NIST 800-193 PFR guidelines 

32-bit Microprocessors (MPUs) With Integrated Security

  • Secure/measured boot root of trust
  • Secure key storage combined with hardware crypto accelerators
  • Active shielding and side channel attack protection
  • Complete software tools and provisioning to get your designs to market quickly

Microcontrollers (MCUs) With Integrated Security

  • Scalable security solutions aligned to fit application security needs such as IP protection, authentication, life cycle management, secure boot and more
  • Comprehensive ecosystem with security software, demos, tools and SoCs for rapid prototyping
  • Security assurance with certified solutions
  • Security training and education with application notes, videos, demos, reference designs, blogs, webinars and articles

Secure Authentication

  • CryptoAuthentication™ and CryptoAutomotive™ security ICs with secure key storage and hardware cryptographic accelerators
  • Hardware vulnerability assessments performed by SOGIS-accredited labs
  • Side channel attack resistance, anti-tamper, memory encryption, scrambling and key zeroization
  • Supported by the Trust Platform flow
  • Complemented with secure key provisioning service
  • Flexible use cases to support a large variety of threat models: anti-counterfeit, disposable and accessories authentication, IoT authentication, OTA, secure boot, key rotations and attestations, transfer of ownership and more

Secure FPGAs

  • Cryptographically controlled supply chain
  • Over 30 built-in tamper detectors
  • Side channel-resistant IP protection

Trust Platform

  • An onboarding methodology to set up security ICs and secure storage subsystems
  • Trust&GO pre-provisioned
  • TrustFLEX pre-configured
  • TrustCUSTOM fully customizable
  • Turnkey use case code examples
  • Supported by the Trust Platform Design Suite (TPDS) software tool
  • Your entry point into our secure provisioning service

Featured Products


CEC1712-SXX-FlipFlop2.jpg

CEC173x Real-Time Platform Root of Trust

Highly Configurable, Mixed-Signal Advanced I/O Controller

  • Immutable ROM and code rollback protection for end-to-end firmware protection
  • Ability to independently and quickly authenticate a piece of firmware before loading into an AP
  • Complete software tools and provisioning to get your designs to market quickly
  • Open Compute Project® (OCP) capable and compliant to NIST 800-193 and Automotive Grade 1
  • Root of trust for data centers, telecom/networking, industrial and automotive designs

Trust Anchor (TA) 100

From Our Portfolio of CryptoAutomotive™ Security ICs

  • Meets certifications for Joint Interpretation Library (JIL) high-rated secure key storage, FIPS 140-2 CMVP module and EVITA “High”
  • Contains ECC, RSA, AES, SHA, Brainpool and Bitcoin hardware accelerators
  • Supports key ransom and attestation, timer-enforced secure boot, message authentication, network authentication, secure firmware update and many more use cases
  • Automotive AEC-Q100 Grade 1 qualified
  • Supported by the Trust Platform secure key provisioning services

PIC32CM LS60

Microcontroller Integrated With Secure Subsystem

  • ECC608 secure subsystem meets Joint Interpretation Library (JIL) high-rated secure key storage
  • Secure boot
  • Arm TrustZone technology
  • True Random Number Generator (TRNG)
  • Asymmetric key cryptography based on ECC and ECDSA
  • Symmetric key cryptography based on AES and GCM
  • Customizable certificate storage slots
  • DICE security standard

dsPIC33C Secure DSCs

dsPIC33C MPT DSC with Integrated HSM

Real-Time Control, Functional Safety Ready, Robust Security

  • Robust security with the simplicity of an MCU
  • Off-die secure subsystem that is compliant with the EVITA Full Specification for automotive security
  • Immutable secure boot
  • Secure firmware upgrade (with live update)
  • Secure on-board communication and message authentication
  • Electronic Control Unit (ECU) authentication
  • WPC 1.3 Qi® high-power wireless charger authentication
  • IP protection
  • Disable debug mode
  • Flash configurable as One-Time Programmable (OTP) memory
  • Specialized features for digital power, motor control, advanced sensing, touch and high-performance designs
  • Automotive AEC Q100 Grade 1 qualified

Browse Our Security Resources


Need Some Help?


We are here to support you. Contact our Client Success Team to get assistance with your design.