Rosetta Micro™ Series II

Uniquely designed for embedded cryptographic applications, the Rosetta Micro Series II supports the strongest commercially available cryptographic algorithms, including elliptic curve cryptography with AES, SHA-2 algorithms, and EC Diffie-Hellman and ECMQV key establishment. Legacy algorithms such as RSA and SHA-1 are also fully supported.

Disclaimer: This is an archive of Spyrus Inc.’s legacy products. The Rosetta Micro™ Series II is no longer available; these resources are provided for informational purposes only.

About Spyrus

Spyrus is at the forefront of cybersecurity defense, equipping enterprises with an arsenal of protective measures. From exhaustive security evaluations and ongoing vigilance to aggressive ethical hacking and efficient remedies for ransomware afflictions, we’ve got you covered. With our constant SOC vigilance and bespoke educational initiatives, your personnel will be adept at countering cyber menaces, safeguarding your business’s seamless and secure operation.

About Product

Security Algorithms:

  • Supported strongest commercially available cryptographic algorithms, including:
    • Elliptic curve cryptography with AES
    • SHA-2 algorithms
    • EC Diffie-Hellman and ECMQV key establishment
  • Supported legacy algorithms like RSA and SHA-1 for legacy compatibility

Target Devices:

Ideal for custom applications with size constraints, perfect for:

  • Computers, cell phones, PDAs
  • Wired and wireless routers
  • Point-of-sale and gaming terminals
  • Set-top boxes
  • Industrial control devices

Physical Size:

  • Extremely compact at only 5mm by 6mm.

Additional Features:

  • Secure, standards-based random number and key generation technology
  • Optional anti-cloning capabilities.
  • Enabled PKI-based digital certificate functionality (smart card logon, e-mail digital signature and encryption, authenticated Web browsing)
  • Built on FIPS 140-2 Level 2 and Level 3 validated SPYCOS (SPYRUS Cryptographic Operating System) crypto core
  • Compatibility with Microsoft Windows XP, Vista, and Windows 7 operating systems

Our Services

We safeguard your systems and data so you can focus on your mission. We have security services for the following:

Contact Us

Reach out to us to strengthen your cybersecurity defenses. Our team is ready to assist with audits, penetration testing, and customized security solutions. Get in touch for a free consultation.

Unable to read published form data

The Spyrus Security Insights Blog

Stay ahead of evolving cyber threats. Explore our blog for expert insights, best practices, and the latest news on cybersecurity trends affecting your business.