Cryptography - Rajant Corporation

MESH NETWORK SECURITY Robust Network Information Assurance with Next-Generation Cryptographic Technology

Reliable and secure communications are the backbone of what Rajant delivers through its Kinetic Mesh® technology. That is why we employ an expert Information Assurance (IA) team comprised of embedded security engineers as well as ASIC, FPGA, and system engineers.

Let’s Connect

Together, they have developed next-generation cryptographic solutions to support the security requirements of an array of mission-critical applications, including those used for DoD’s most sensitive secure communications systems.

The team’s latest innovation is the Rajant In-line Security Module (RiSM). The RiSM provides military  and government security for commercial needs. Any data deemed critical to your business can and  will be protected at a FIPS level. The RiSM is a commercially available Hardware Security Module  (HSM) that allows users to meet the latest NIST standards for encryption (FIPS 140-3) and  requirements for protecting Sensitive But Unclassified (SBU) and Controlled Unclassified  Information (CUI) data.

rism

Click Here to Download RiSM Spec Sheet

The Rajant Wolverine is a fully programmable multi-chip design that leverages commercially  sourced System on a Chip (SoC) FPGA and Application-Specific Integrated Circuit (ASIC) network  processor. The Wolverine cryptographic module design is built for programmable flexibility to add  new algorithms in the future while also meeting stringent U.S. government certification  requirements. Wolverine contains advanced encryption and authentication algorithms using a  fail-safe design to provide design flexibility for multiple IoT applications.

 

mesh network security

Scalable Architecture with Custom Programmability

Wolverine utilizes industry-standard cells and IOs so that it can be easily migrated to meet higher performance requirements and/or to an ASIC design with minimal changes. Programmability also allows for customization of key management protocols such as EKMS and Tactical Key Management (TKM). Wolverine’s cryptographic algorithms support robust Key Rollover and future Over-The-Air-Keying (OTAK) solutions, which are essential methods for protecting classified data.

quote

Secure Boot Capability that Goes Beyond Standard Security Processers

Wolverine’s Secure Boot capability governs what trusted software is allowed to run within the system and serializes the IP software/firmware modules upon initial load. This serialization means that every Wolverine-based solution has a uniquely encrypted software/FPGA image stored in flash while it is fielded. Therefore if an adversary obtains a decryption key from one Wolverine unit, it will be useless on all other Wolverine units.

network information assurance

Wolverine can also serve as the root certificate and symmetric key storage element for the system. Certifiable anti-tamper capabilities ensure the most critical aspect of the security architecture, the keys, are inaccessible to an adversary.

Future-Proof While Meeting Stringent Certification Requirements

Wolverine can be easily modified to meet a wide range of future crypto processing needs for algorithm agility, I/O flexibility, and Key Management evolution. New algorithms can be added while continuing to meet stringent U.S. Government certification requirements, and footprint-compatible FPGA options are available to increase FPGA fabric size.

Download the Full Wolverine Brochure