You are here : design-reuse-china.com  > Security Solutions  > Cryptography
Download Datasheet        Request More Info
All Silicon IP


The eSecure IP is a complete standalone module that enables security applications by shielding the secret information from the non-secure application running on the main processor. The firewall prevents any unauthorized access to the secret data. The secure controller embedded in the eSecure module keeps full control of the execution of the security functions. In some designs, the secure controller can be optionally virtualized in the host processor.


Software/firmware authentication

One of the key elements of a secure device is to execute authenticated and trusted software in order to prevent malicious code execution. The eSecure IP provides a strong authentication of the software/firmware at boot-time (secure boot) and during run-time. It will also optionally decrypt the code before execution by the host processor

Device unique identity

In order to protect applications and products against counterfeiting and cloning, it is important to be able to uniquely identify each manufactured part. This identification also enables device authentication and per device rights management.

Secure storage of secret information

A secure application always requires some data to be kept secret. The eSecure IP can store secret keys and other information inside a secure or non-secure storage area. For non-secure area such as external flash memories, the eSecure IP will guarantee the confidentiality and authenticity of the data with strong cryptographic algorithms.

Secure communication

In today's connected world, most applications involve secure communication protocols. The eSecure cryptographic engine supports all the latest algorithms for TLS/DTLS 1.3, Thread Networking, Apple HomeKit, Bluetooth, Zigbee and more.


  • Wireless Communication (Wifi, thread protocol, Zigbee, BLE..)
  • V2V, V2X
  • M2M
  • HSM
  • Secure Communication (TLS/DTLS, IPSec, 5G, others)
  • Disk Encryption
  • General MCU/MPU

Block Diagram


  • Secure Boot
  • Firmware update in the field
  • Secure key storage
  • Cryptography algorithms off-loading
  • Side Channel Attack protection
  • Secure Debugging
  • Key Management
  • Low power and high performance
  • Very wide range of cryptographic algorithms supported








© 2018 Design And Reuse


不得复制,重发, 转载或以其他方式使用。