Bedrock Secure Processor

Protect Weapon Systems Data

Bedrock is a purpose-built secure processor designed to fulfill U.S. Anti-Tamper and Cyber Survivability requirements to protect weapon systems containing Critical Program Information (CPI) and Classified Data. Bedrock security, performance, and form factor allow for broad applicability for securing commercial circuit cards and U.S. government weapon systems.

The Bedrock ASIC has two primary use cases:

 

Root of Security: When equipped with Idaho Scientific’s Keystone software, Bedrock operates as a Root of Security that can securely boot and extend security to an Intel x86 device. This enables weapons systems to deploy high performance Intel x86 processors by overcoming the physical and cyber vulnerabilities in these commercial-grade devices. To that end, Bedrock was specially designed to fulfill the role of a baseboard management controller and provide advanced security features to the compute and payload modules developed in OpenVPX, ComExpress, and other ruggedized formfactors.

 

General Purpose Embedded Secure Processor: Bedrock is equipped a secure boot, environmental sensors, hardware-based cryptography along with an embedded-class, 64-bit, quad-core, RISC-V processor. This dual-issue, multi-core system can support popular embedded operating system like Linux, VxWorks, and FreeRTOS. Bedrock is suitable for directly processing critical program information and classified data in support of size, weight, and power (SWAP) constrained weapons systems. In addition, Bedrock contains two eFPGA fabrics to allow for custom designs and security IP to be integrated into the device.

Benefits of Bedrock

 

Benefits

Features 

Deliverables 

Insanely Fast Boot Time: Ideal for tactical applications that require minimal time to ready (TTFS, TMR)

 

 

Save SWAP, improve security: Board management logic is simplified, protection now extends to pre-boot

 

 

Flexibility: EFPGA fabric to allow for users to add custom logic or integrate IP.  The use case allows for extending the security of the device to package and higher level assemblies.

 

 

Incorporates state of the art in commercial and defense security: Hardware-based cryptography (including PQC algorithms), environmental sensors, and secure boot.

 

 

Zero Trust Enablement: Provides a cryptographically secure platform for running a device’s trusted computing base, which is integral to ZT implementations

 

 

Transparent to User/Developer: Maintains compatibility with existing software design and development practices, requiring minimal modification to the compilation process

 

 

Developed and supported by a trusted U.S. DOW supplier: Our team in the Mountain Time Zone answer emails, take phone calls and can travel to make sure your integration goes smoothly

 

Lower Power Domain: (<3 Watts in reduced power mode)

  • CNSA 2.0 Compliant Crypto system with countermeasures for Side Channel Analysis and Fault Injection
  • Cyber-Hardened 64-bit RISC-V processor (BareMetal, FreeRTOS) with Helios Memory Guard technology
  • 50k 6-input Look Up Tables (LUTs), 156KB of BRAMS and 26 DSP slices in eFPGA
  • UART, 4x I2C, OctalSPI, ADC, GPIO

 

Full Power Domain: (<10 Watts)

  • Cyber-Hardened 4-core 64-bit RISC-V CPU (BareMetal, FreeRTOS, Linux) with Helios Memory Guard technology
  • 14k 6-input Look Up Tables (LUTs), 128KB of BRAMs, and 16 DSP slices in eFPGA
  • LPDDR, Gen 4 PCIe x4, 10/100/1000Mbps RGMII / 10Gbase-KR Ethernet, QSPI, UART, GPIO

 

Programable I/O options available via LPD and FPD eFPGA:

  • QSPI Master/Slave, I2C, I3C, GPIO, PWM, LPC, PCIE, JTAG Master, 3.3V DIO

 

Positive Control: Just-in-time cryptographic verification for instructions and data within the processor’s memory subsystem to ensure only genuine and unaltered software executes.

 

Software Exploitation and Remote Code Execution Prevention: Strict separation between instructions and data with unique instruction and data keys, prohibiting the CPU from consuming malicious instructions that were generated at run-time from memory corruption and other software exploits.

 

Memory Encryption and Authentication: Software is protected at-rest, in-transit, and during use in all off-chip components.

Hardware Root of Security supporting DIW Anti-Tamper and Cyber Security requirements


Extension of Security to x86 processors


Hardware Security Module targeting NSA type-1 Data-at-rest and Cross Domain Solutions


Baseboard Management Controller


Intelligent Platform Management Controller (VITA 46.11)


Secure general-purpose embedded processor


 

Frequently Asked Questions (FAQs)

 

Compatibility

 

Does Bedrock support low SWAP-C applications?

Yes, Bedrock is built in a low-power, 12nm FinFet process. The core clock is scalable to the application and Bedrock employs low- and full-power islands to help reduce standby power requirements.

 

What kind of software can Bedrock Run?

Bedrock can run quad-core Symmetric Multi-Processing (SMP) workloads as Bare Metal, FreeRTOS, VxWorks, or Linux based applications.

 

What software development tool are supported by Bedrock?

Bedrock is fully complaint with the RISC-V RV64G ISA. Idaho Scientific recommends using a suitable open-source compiler like GNU GCC like those available in Linux and with VxWorks.

 

Security

 

Which encryption algorithms are available for use in Bedrock?

Bedrock includes a full implementation of NSA’s CNSA 2.0 with mitigations against SPA, DPA, and fault injection.

 

Who generates the keys used by the Bedrock HPS?

Idaho Scientific provides the software “Packager” utility, allowing the OEM or end customer to generate and manage their own cryptographic keys.

 

Performance

 

What kinds of performance can you expect from Bedrock?

The 64-bit RISC-V processor in Bedrock’s low power domain is capable of running at 500 MHz. This equates to 1000MIPS. The Helios Processing System (HPS) within Bedrock’s full power domain is a quad-core 64-bit RISC-V processor. This processor is capable of up to 2 Instructions per cycle per core at 800 MHz core clock frequency. This equates to 6400MIPS.

 

Idaho Scientific Logo

 

Idaho Scientific, now part of General Dynamics Mission Systems, specializes in embedded security with a proven track record of solving the hardest cybersecurity, supply chain integrity and anti-tamper problems with novel and scalable solutions.  

Learn More


Copyright 2026 General Dynamics Mission Systems, Inc.

A General Dynamics Business