RCP (Reconfigurable Computing Processor)
Relying on the reconfigurable computing technology of Tsinghua University, Catamicro launched a new high-performance security SOC processor, namely RCP. RCP contains three independent MCU with a primary frequency of 1 GHz, on which different programs or operating systems can run separately. Thus, a variety of complex application scenarios can be jointly handled by RCP, while the power consumption of RCP is only 3.5 W. In addition, a variety of high-performance hardware algorithm engines are equipped in RCP. The third-generation PCIE X8 independent master-slave interface is supported by RCP as well. In a word, RCP can be used as a trusted chip in cloud computing, big data, industrial control systems and other fields to meet the needs of various high-performance and high-security applications. RCP has passed the second-level of security chip certification and the third-level of trusted password module certification approved by the State Cryptography Administration Office of Security Commercial Code Administration (OSCCA).

Application Scenario

Scenario 1: High-speed Password Calculation

RCP is equipped with a variety of high-performance hardware algorithm engines, which can effectively accelerate the operation efficiency of the national cryptographic algorithm (SM2/3/4) and the international general algorithms (RSA/AES/SHA, etc.), and provide safe and efficient cryptographic services to customers. In addition, by equipping with the reconfigurable computing core from Tsinghua University, RCP provides dynamic reconfigurable units for public algorithms or customer-specific algorithms, which can accelerate the efficiency of algorithm execution, and support nanosecond-level algorithm switching.
 

Scenario 2: Sensitive Data Management

RCP supports high-security basic components, such as physical non-cloning function (PUF), one-time programming (OTP) memory, true random number generator (TRNG), etc. Sensitive data is covered by the physical characteristics of the chip, which has the characteristics of cipher text storage and non-cloning. Accordingly, hardware level high security services, such as key generation, key management, and data encryption storage, are available to customers.
 

Scenario 3: Trusted Computing Service

RCP has obtained the highest security level certification of the trusted cryptographic module (TCM) approved by OSCCA. Relying on the rich hardware resources and powerful computing performance, RCP can virtualize several or even dozens of logically independent TCM/TPM /TPCM trusted roots, which can provide dedicated hardware trusted root and trusted computing service for each upper-layer device.