nQrux® CCE
Confidential Computing Engine

nQrux® CCE offers customisable solutions protecting data, code execution, and AI models in distributed environments, such as cloud and edge.

nQrux® Confidential Computing Engine (CCE) offers customisable solutions protecting data, code execution, and AI (Artificial Intelligence) models in distributed environments, such as cloud and edge. nQrux® CCE solutions are tailored and optimised according to customer application, performance, and security requirements, to host customised computing resources (e.g. CPU cores and application-specific accelerators). Cryptographic algorithms are based on CAVP-verified implementations.

nQrux® CCE securely processes data and code uploaded by client nodes over a TLS 1.3 protected communication channel. Clients can be categorised into groups with defined access rights to the resources hosted by the CCE. Access policies are enforced with hardware isolation of resources and TLS 1.3 client authentication.

Tailored confidential computing infrastructures for...

AI processing and remote code execution

Satellite and mission-critical applications

Remote use of accelerator IP cores in FPGA farms

Industrial and IoT environments

Key features

  • Complete physical isolation of code & data

  • Secure code & data transmission with TLS 1.3

  • Quantum-secure crypto option

  • Versatile computational enclave:

    • RISC-V or customer-specific cores

    •  Application-specific accelerators

  • Tailored based on application, security, and performance requirements
  • For FPGA and ASIC implementations

Technical specifications

nQrux® Confidential Computing Engine

Product code: XIP7700

RISC-V

Optional customer-specific core

Specified and implemented according to requirements

For more technical details, including FPGA resources & peak performance as well as ordering instructions, send us a message.

CCE and TLS 1.3

Communication of data and code to the CCE is protected with hardware-based TLS 1.3. Access policies are enforced with hardware isolation of resources and TLS 1.3 client-authentication, so that only clients with appropriate certificates are allowed to access specific resources.

Xiphera’s cryptographic Security Protocols secure point-to-point communication as well as server-client connections over the Internet.