StealthMem™

Advanced Memory Encryption IP

StealthMem delivers comprehensive security for your entire memory ecosystem through high-performance encryption and authentication. Built on our industry-leading StealthAES technology, StealthMem seamlessly integrates into FPGA and ASIC designs with advanced features including AXI bus mastering, hardware-based key management, and proprietary StealthCores security architecture.

Designed for mission-critical applications across commercial, industrial, and defense sectors, StealthMem provides robust protection for code, data, and configuration memory, ensuring both confidentiality and authenticity at rest and during operation.

Key Features of StealthMem

  • Comprehensive Memory Protection: StealthMem encrypts and authenticates memory reads and writes in real time, supporting RAM, flash, and NVME interfaces. Designed to protect software and sensitive data from physical attacks and reverse engineering.

  • Verified Side-Channel Resistance: StealthMem leverages the verified countermeasures from StealthAES, tested with over 1 billion operations and validated using both TVLA and template attacks. Secure key storage and non-deterministic data paths ensure your keys and plaintext remain protected.

  • High-Performance AXI Bus Mastering: With full AXI master capabilities, StealthMem interacts directly with system memory, minimizing latency and CPU overhead. Fully compatible with AXI4 and AXI4-Lite interconnects for seamless integration into your existing architecture.

  • Hardware-Based Key Management: Integrated secure key vault with hardware-enforced access controls enables flexible key rotation, secure storage, and cryptographic isolation across different memory regions and security domains. Keys are securely loaded and decrypted for non-volatile memories, ensuring protection throughout the entire key lifecycle.

  • Scalable Performance: StealthMem is available in multiple configurations optimized for area, performance, or power, depending on your memory bandwidth and latency needs.

  • Authenticated Encryption: Combining confidentiality, integrity, and authenticity in a single solution prevents both data exposure and tampering attacks on your critical memory assets.

Technical Specifications

  • Supports AES-GCM authentication and encryption with 256-bit keys

  • Configurable memory region protection with granular access controls

  • Low-latency implementation with configurable performance

  • Complete RTL source code or encrypted netlist delivery options

  • Custom interfaces and capabilities available upon request

  • Comprehensive integration support and documentation

Target Applications

  • Secure boot and firmware integrity protection

  • Encrypted execution environments for sensitive applications

  • Encrypted memory for AI/ML accelerators and edge computing

  • Defense-grade tamper solutions

  • Anti-reverse engineering for proprietary algorithms and embedded systems

Get in Touch

For detailed area and performance data, implementation guidelines, and information on different configurations and target devices, contact the StealthCores team today. Let our security experts help you integrate StealthMem into your design with maximum efficiency and protection.