Blogs

Hardware Security Module (GRHSM) IP Core: Enhancing Security in Critical Systems

February 20, 2025

As cyber threats evolve, safeguarding cryptographic operations and ensuring system integrity have become essential for modern embedded systems. Our Hardware Security Module (GRHSM) IP core provides a dedicated, isolated subsystem for cryptographic processing, boot authentication, and secure key management. By offloading these critical tasks from the main processing unit, the GRHSM offers a robust and efficient security solution for any application. The module can be customized with user-specific cryptographic software libraries, allowing flexibility for a wide range of applications. GRHSM will also be integrated in the GR765, the next-generation octa-core rad-hard microprocessor.

Applications

GRHSM enables cryptographic operations in an isolated environment. It can be used also to ensure that only trusted boot and runtime software are executed, mitigating risks of tampering in highly sensitive environments.

It securely stores cryptographic keys and enables encrypted communication, enhancing the security and reliability of network infrastructures.

Overview

The GRHSM is built to integrate with System-on-Chip (SoC) architectures and is designed to allow software upgrades to meet changes in requirements on cryptographic algorithms. The software programmability also allows to support post-quantum cryptography (PQC) algorithms. GRHSM uses on-chip non-volatile memory to store cryptographic keys securely, protecting them from unauthorized access.

The core of the GRHSM includes a dedicated processor with cryptographic accelerators, on-chip RAM, with interfaces to non-volatile memory that can be either on- or off-chip. This architecture creates an isolated environment for secure key storage and cryptographic operations. Additionally, it is possible for end users to extend the design with their own functionality.

The GRHSM operates independently from the main SoC, accelerating secure communications, key management, and system integrity verification without exposing sensitive data or processes.

Conclusion

The GRHSM is a reliable solution for securing embedded systems in critical applications. Its hardware-based isolation and cryptographic capabilities enable data integrity, secure communication, and protection against emerging cyber threats.

For more information on the GRHSM, visit the product webpage or contact us.