Addressing key security requirements
Digital devices deal with a wide range of possible threats; CryptoCell addresses the different security requirements coming from different stakeholders. Standard bodies and commercial organizations, such as Global Platform, NIST, MIIT, Google, Apple, Microsoft and others, define different attack vectors as pertinent (software attacks, inter-chip signal probing, board level software-based debug and test attacks, physical interface attacks and more).
To enable SoC vendors to address these attacks, CryptoCell offers protection of key device assets. Key device assets usually include:
- Software images (system, application, etc.)
- Key material (such as device or application keys)
- Data (such as corporate data, 3rd party data such as audiovisual content, or user data)
TrustZone CryptoCell facilitates these security requirements and provides the necessary tools and building blocks to mitigate such attacks.
Security Certification and Compliance
Security certification schemes based on standards like FIPS 140-2 or the Common Criteria based GlobalPlatform TEE, are all targeted at verifying the security of complete products. TrustZone CryptoCell provides the tools, building blocks and documentation necessary to comply with these standards.
It also provides the necessary security infrastructure to comply with the robustness rules that are published by many commercial organizations and consortiums (such as Microsoft, China DRM Forum, Google, DCP LLC, Thread, IETF and more).
Commercial deployment and market traction
CryptoCell is commercially deployed within chipsets covering many different verticals and markets such as mobile, IoT, home entertainment and automotive.