embedded award 2025: Safety&Security nominees
Increasingly intensive networking of embedded systems increases the demands on the functional safety of hardware and software and on protection against external attacks (security). The general security situation leads to an increased threat potential. The solutions of the nominees in the Safety&Security award category help with this.
A quantum-resistant encryption for edge applications, a truly open secure element chip and a supervisor software layer for safety
Stealth Quantum Secure AES for Edge applications
Exhibitor: Pantherun Technologies
Hall/Booth: 5-279
The innovation in Pantherun’s Stealth Quantum Secure AES lies in its combination of advanced encryption, patented key exchange mechanisms, and post-quantum cryptographic (PQC) algorithms, tailored specifically for edge applications. It bridges the gap between current encryption standards and the emerging need to secure data against quantum computing threats.
Traditional encryption methods like RSA or ECC rely on mathematical problems that quantum computers could solve efficiently. Stealth Quantum Secure AES mitigates this risk by incorporating PQC algorithms that resist quantum attacks, alongside lightweight implementation suited for resource-constrained edge devices.
Additionally, Pantherun’s patented key exchange protocol enhances security over conventional SSL/TLS or IPSec methods by minimizing vulnerabilities to Man-in-the-Middle (MITM) and Replay attacks. Its low-latency design ensures real-time secure communication for IoT, industrial automation, and automotive systems.
This innovation future-proofs edge deployments, offering scalable, quantum-resistant security while maintaining the performance demands of modern, distributed applications.

TROPIC01
Exhibitor: Tropic Square
Hall/Booth: 5-373
TROPIC01 is the first truly open architecture hardware secure element. All declared security features and capabilities can be verified independently. TROPIC01’s open-architecture design combines academically recognized cryptographies (e.g. ECC, AES-GCM, SHA-256) that are implemented into cryptographic hardware accelerators in a secure element chip.
The secure element is designed to be tamper resistant from advanced physical attacks including voltage, laser, and electromagnetic glitching. TROPIC01 is the only secure element known to implement the Noise Protocol framework-based secure channel for protected and authenticated data exchange.
1) TROPIC01 is a truly open secure element chip that implements strong side channel countermeasures while limiting the attack surfaces through its minimalistic design.
TROPIC01 is truly open, meaning the security implementations can be verified by anyone – something that is not currently available in the market. We offer any interested parties details of the security architecture. The evaluation and testing results are also available for review.
These resources enable a community approach to addressing and managing discovered vulnerabilities. Rather than relying on just a restricted group of employees, partners, and certified organizations to maintain the security of the secure element, a wider ecosystem of security experts is invited for evaluation and resolution.
Customers benefit from a level of security that covers not just predefined attack scenarios, but also emerging security threats and attack vectors.
2) TROPIC01 offers flexible customization privileges. Competitor vendors hold access to update chip firmware. In contrast, TROPIC01 customers can directly customize the chip’s firmware to implement their own cryptography or security features.
A second customization option is using the TROPIC01 platform to develop a white labelled derivative chip tailored for a customer's specific use case.
Website of the product and Website of the company
Would you like to delve deeper into the topic?
At embedded world Exhibition&Conference 2025 from March 11 to 13, 2025,
you will have the opportunity to exchange ideas with industry experts.

EB corbos Linux for Safety Applications
Exhibitor: emlix GmbH
Hall/Booth: 4-336
With EB corbos Linux for Safety Application not the Linux itself claims to be safe but instead safety comes with a supervisor software layer which detects whenever Linux does not behave dependable.
In order to achieve this goal
- a hypervisor provides Linux with virtualised memory and computation resources, hence the hypervisor has full control over the access to those resources by Linux
- a supervisor software analyses any attempt made by Linux to access memory or computation resources and detects when such an attempt is able to adversely affect the dependability of the safety function (in the acception given by IEC61508).
This solution leverages the features offered by advanced hardware to supervise the behaviour of Linux, namely its access to memory and processing resources.
With this approach the safety function of a control system relies on the hypervisor and the supervisor, which are involved in the saftey argument. The Linux is not. Instead, it can be used with almost all of its features. And it can be updated and maintained without affecting the safety of the cyber-physical system.
Additionally this solution allows to execute both safety-related (supervised) and non-safety-related (unsupervised) applications at the same time on the same Linux. The non-safety-related application is like any other application running on Linux and is not affected or functionally limited by the presence of the safety-related application.