mobile network technology

Robust Information Assurance with Next-Generation Cryptographic Technology

Reliable and secure communications are the backbone of what Rajant delivers through its Kinetic Mesh® technology. That is why we employ an expert Information Assurance (IA) team comprised of embedded security engineers as well as ASIC, FPGA, and system engineers.

Schedule a Demo

Together, they have developed next-generation cryptographic solutions to support the security requirements of an array of mission-critical applications, including those used for DoD’s most sensitive secure communications systems.

The team’s latest innovation is the Wolverine, Rajant’s next-generation, fully programmable cryptographic module technology that leverages a commercially sourced System on a Chip (SoC) FPGA and Application-Specific Integrated Circuit (ASIC) network processor. Wolverine contains advanced encryption and authentication algorithms using a fail-safe design to secure multiple IIoT applications with future-proof flexibility. Here’s how:

cryptography technology module

Scalable Architecture with Custom Programmability

Wolverine utilizes industry-standard cells and IOs so that it can be easily migrated to meet higher performance requirements and/or to an ASIC design with minimal changes. Programmability also allows for customization of key management protocols such as EKMS and Tactical Key Management (TKM). Wolverine’s cryptographic algorithms support robust Key Rollover and future Over-The-Air-Keying (OTAK) solutions, which are essential methods for protecting classified data.

Secure Boot Capability that Goes Beyond Standard Security Processers

Wolverine’s Secure Boot capability governs what trusted software is allowed to run within the system and serializes the IP software/firmware modules upon initial load. This serialization means that every Wolverine-based solution has a uniquely encrypted software/FPGA image stored in flash while it is fielded. Therefore if an adversary obtains a decryption key from one Wolverine unit, it will be useless on all other Wolverine units.

crypto solutions for networks

Wolverine can also serve as the root certificate and symmetric key storage element for the system. Certifiable anti-tamper capabilities ensure the most critical aspect of the security architecture, the keys, are inaccessible to an adversary.

Future-Proof While Meeting Stringent Certification Requirements

Wolverine can be easily modified to meet a wide range of future crypto processing needs for algorithm agility, I/O flexibility, and Key Management evolution. New algorithms can be added while continuing to meet stringent U.S. Government certification requirements, and footprint-compatible FPGA options are available to increase FPGA fabric size.

Download the Full Wolverine Brochure


When Information Security is a Priority, Choose Rajant

Rajant is committed to assuring the integrity and security of your mission-critical voice, video, and data communications. We take information assurance seriously and are invested in ensuring we have the latest cryptography technology to keep your sensitive data protected. Schedule a demo to learn more about our network and security capabilities today.

By submitting, you agree with Rajant's Privacy Policy.