Together, they have developed next-generation cryptographic solutions to support the security requirements of an array of mission-critical applications, including those used for DoD’s most sensitive secure communications systems.
The team’s latest innovation is the Rajant In-line Security Module (RiSM). The RiSM provides military and government security for commercial needs. Any data deemed critical to your business can and will be protected at a FIPS level. The RiSM is a commercially available Hardware Security Module (HSM) that allows users to meet the latest NIST standards for encryption (FIPS 140-3) and requirements for protecting Sensitive But Unclassified (SBU) and Controlled Unclassified Information (CUI) data.
Click Here to Download RiSM Spec Sheet
The Rajant Wolverine is a fully programmable multi-chip design that leverages commercially sourced System on a Chip (SoC) FPGA and Application-Specific Integrated Circuit (ASIC) network processor. The Wolverine cryptographic module design is built for programmable flexibility to add new algorithms in the future while also meeting stringent U.S. government certification requirements. Wolverine contains advanced encryption and authentication algorithms using a fail-safe design to provide design flexibility for multiple IoT applications.
Scalable Architecture with Custom Programmability
Wolverine utilizes industry-standard cells and IOs so that it can be easily migrated to meet higher performance requirements and/or to an ASIC design with minimal changes. Programmability also allows for customization of key management protocols such as EKMS and Tactical Key Management (TKM). Wolverine’s cryptographic algorithms support robust Key Rollover and future Over-The-Air-Keying (OTAK) solutions, which are essential methods for protecting classified data.
Secure Boot Capability that Goes Beyond Standard Security Processers
Wolverine’s Secure Boot capability governs what trusted software is allowed to run within the system and serializes the IP software/firmware modules upon initial load. This serialization means that every Wolverine-based solution has a uniquely encrypted software/FPGA image stored in flash while it is fielded. Therefore if an adversary obtains a decryption key from one Wolverine unit, it will be useless on all other Wolverine units.
Wolverine can also serve as the root certificate and symmetric key storage element for the system. Certifiable anti-tamper capabilities ensure the most critical aspect of the security architecture, the keys, are inaccessible to an adversary.
Future-Proof While Meeting Stringent Certification Requirements
Wolverine can be easily modified to meet a wide range of future crypto processing needs for algorithm agility, I/O flexibility, and Key Management evolution. New algorithms can be added while continuing to meet stringent U.S. Government certification requirements, and footprint-compatible FPGA options are available to increase FPGA fabric size.
Download the Full Wolverine Brochure