Rambus Inc. has announced a full suite of security IP (internet protocol) solutions for the FPGA (field programmable gate arrays) market with cryptographic, side-channel, and quantum safe protections. Designed to meet the needs of FPGAs, the offering secures the broad range of devices from high-performance accelerators for generative AI, to low-power solutions for IoT (internet of things) devices. Rambus security IP protects FPGAs serving applications in data centre, AI/ML (artificial intelligence / machine learning), edge, IoT, defense, and beyond.
“As customer demand for security continues to accelerate, Rambus is dedicated to providing state-of-the-art security IP for the broad range of applications increasingly enabled by FPGAs,” says Neeraj Paliwal, general manager of Silicon IP at Rambus. “Our security IP solutions safeguard these FPGA devices now and in the future with Quantum Safe protection from PQC attacks.”
“In the increasingly distributed and accelerator-based computing architectures enabled by Intel FPGAs, it is mission critical to secure data and devices against today’s threats and those that arise with the advent of quantum computing,” says Premal Buch, vice president and general manager of programmable solutions at Intel. “We’re pleased to see Rambus offer security IP solutions tailored to FPGAs powering the growing landscape of accelerated computing.”
As part of the industry-leading portfolio, Rambus offers advanced FPGA targeted security IP products including root of trust, 800G MACsec, IPsec, classic and quantum safe public key encryption solutions. Leveraging pioneering work in differential power analysis (DPA) and fault injection attack (FIA) countermeasures, Rambus security IP delivers the highest levels of protection available against both cryptographic and side-channel attacks. With new Quantum Safe security IP products, Rambus futureproofs the protection of FPGAs for the coming post quantum cryptography (PQC) era.
For more information about Rambus Security IP, please visit here.
Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow