mSafe
Strong security is a
must. In the past few years, companies and
individuals alike have lost billions of
dollars from hacking, phishing, ID theft and
other security breaches. To protect your
next silicon implementation, we offer
best-in-class mSafe (formerly SuperMAP)
crypto cores, made smarter by our patented,
field-proven technologies. A trusted partner
to complement your silicon, we bring our
security IP to your designs - mobile,
embedded systems, conditional access, smart
cards, and consumer electronics – so you can
secure more business.
Crypto building blocks
mSafe (formerly SuperMAP) crypto cores
support all industry-standard ciphers,
including: PKI (RSA, ECC, DH, DSS),
symmetric ciphers (DES/3DES, AES), hash
(SHA1/MD5) and FIPS 140-2 compliant zero
knowledge RNG. mSafe crypto cores are key
building blocks in creating secure solutions
for digital rights management (DRM), IPTV/DTV,
set-top boxes, personal media players,
secure communication, banking, e-commerce,
m-commerce and automotive.
crypto cores. made smarter
Strong silicon IP
mSafe crypto cores are backed by
our solid track record, dating to 1990, and
by dozens of patents. Our strong silicon IP
and extensive prior art protects you and
your customers from third party claims.
silicon IP. made smarter
Short time-to-silicon
mSafe cores are silicon-proven in
tens of millions of smart cards and secure
flash storage devices, and are implemented
by many foundries over several process
generations. Leveraging our extensive
experience shortens your time-to-silicon and
significantly reduces development risk. Our
robust support services enable you to pass
even the most rigorous industry
certification.
silicon design. made smarter
mSafe Hardware
crypto cores |
mSafe Software
crypto cores |
Top
performance, small area, low
power and fully scalable
based on power/speed/area
requirements |
Same
API as hardware cores for
quick integration, supports
all industry-standard
ciphers, ANSI C+ optimized
for leading CPUs |
mSafe Consulting |
Our experienced team can
analyze your security
architecture, verify design
and attack protection, and
guide you through the most
demanding certification
process. |
|