Layered Security for Your Next SoC
Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.
Arm CryptoIsland Family
The CryptoIsland family provides a fully isolated subsystem, providing a similar set of security services, with the addition of greater scope for programmability and reuse.
The CryptoIsland family of products provide Arm partners with a highly integrated security subsystem. It does this by isolating roots of trust in a very robust manner, while increasing the ease of reuse by virtue of its physical isolation.
Arm CryptoCell Family
Arm CryptoCell enables the protection of assets (code and data) belonging to different stakeholders in an ecosystem (e.g. silicon vendor, OEM, service provider, user). CryptoCell enables SoC designers to trade off area, power, performance or robustness in a very flexible manner so that SoC designs can be optimized to achieve the most appropriate security level for the target market.
Arm CryptoCell-300 Family
The CryptoCell-300 family is optimized for low power and resource constrained platforms. The CryptoCell-300 family is usually coupled with Cortex-M or Cortex-R CPUs for environments that require a small footprint (e.g. IoT).
Arm CryptoCell-700 Family
The CryptoCell-700 family is aimed at higher performance systems. CryptoCell-700 series is usually coupled with Cortex-A CPUs for performance intensive use cases (e.g. mobile).
Protection Against Physical Security Attacks
There is no doubt that chip-based physical attacks are becoming easier and more dangerous. Arm provides a suite of security IP to guard the SoC on several fronts, from the Arm Cortex-M35P processor with tamper-resistance to a family of IP to protect against side-channel attacks.
Processor IP with Arm TrustZone Technology
Arm TrustZone technology is a system-on-chip (SoC) and CPU system-wide approach to security with hardware-enforced isolation to establish secure end points and a device root of trust.
Explore how TrustZone technology can be integrated into our Arm Cortex processors:
Arm TrustZone Security System IP
Arm also have a range of Security System IP, including: the TrustZone Random Number Generator, TrustZone Full Disk Encryption and TrustZone Address Space Controllers.