Zymbit security modules provide multiple layers of physical and digital protection for your digital assets, managed through a simple API.
Zymbit manufacturing tools and services help you transition to volume manufacturing quickly and securely.
Private / public key pairs | 3 |
Cryptographic Services | TRNG (NIST SP800-22) ECC NIST P-256 (secp256r1) ECDSA (FIPS186-3) AES-256 (FIPS 197) |
Tamper Sensors | 2 x Perimeter breach detection circuits Main power monitor |
Software API | Python, C++, C |
Physical Format | Plug in mini-hat (pins 1 - 10) |
Dimensions | 39.0 x 14.0 x 5.3 mm 1.53 x 0.55 x 0.21 Inches |
Board Connectors |
GPIO: 5x2pin header, 0.1inch Perimeter: 12pin JST 0.8mm receptacle (mates with JST 12SUR-32S) Battery: 2pin JST 0.8mm receptacle (mates with JST 2SUR-32S) |
Communication | I2C, default address, user changeable GPIO4, user changeable |
Production mode lock | Software API command |
Measured system identity & authentication | Standard factors include RPI host, SD card, Zymkey |
Data encryption & signing applications. | Encrypt root file system with dm-crypt, with LUKS key manager hook Encrypt data blobs with "zblock" function Encrypt data in flight with OpenSSL integration |
Real time clock | 24-36 month operation, application dependent, 5ppm accuracy. |
Backup battery | Used for RTC and perimeter circuits Requires JST connected coin cell, RPI 5 RTC battery , or similar, (not included) Recommend |
Backup battery monitor | Yes |
Last Gasp battery removal detection | No |
OEM Custom features | Contact Zymbit |
Example Cipher Suites | AWS-IOT | TLS_ECDHE_ECDSA_AES256_SHA MS-AZURE | TLS_ECDHE_ECDSA_AES_128_GCM_SHA256_P256 |
Accessories & related products | Backup battery, perimeter cables |
Warranty | 18 months |
Compatibility | Pi Zero, 4, 5 |