在线咨询
eetop公众号 创芯大讲堂 创芯人才网
切换到宽版

EETOP 创芯网论坛 (原名:电子顶级开发网)

手机号码,快捷登录

手机号码,快捷登录

找回密码

  登录   注册  

快捷导航
搜帖子
芯片精品文章合集(500篇!)    创芯人才网--重磅上线啦!
查看: 3753|回复: 4

[资料] 我有security and encryption IP cores

[复制链接]
发表于 2014-9-1 10:35:35 | 显示全部楼层 |阅读模式

马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。

您需要 登录 才可以下载或查看,没有账号?注册

x
本帖最后由 111_ZH 于 2014-9-1 10:46 编辑

我能提供下列Crypto IP cores::DES and 3-DES , PublicKey engine, Random Number Generator,Hashengine,AES


(1)  DES and 3-DES IP core

The DES/3DES core implements the DataEncryption Standard according to Federal Information Processing Standards Publication46-3 the (FIPS 46-3) of the National Institute of Standardsand Technology.


Features:

64-bit data blockencryption and decryption in ECB, CBC, MAC and MDC2 mode·

56-bit key in DESmode, 56 / 112 / 168·-bit key in 3DES mode

Encryption or decryptionperformed in 16 cycles for DES, 48 cycles for 3DES·

64-bit data input,data output and key input buses·

1 clock signal(positive edge), 1 asynchronous reset·

Compliant withFIPS 800-17 and FIPS 800-20 test specifications·

Internal DMA withAMBA (AHB, AXI) Master interface (option)·

Slave interfacewith AMBA (AHB, AXI) Slave interface (option)·

APB Compliantinterface for configuration·

IP is available onasic / FPGA·


(2) PublicKey engine

The Public Key engine has a μCode  based architecturethat  can support several algorithms and operations, allowing to  completely  (100%)  offload  the  cpu. This  architecture  gives  the  efficiency  of the  hardware  and the flexibility of the software. The flexibility and scalability of the Public Key engine  enables us  to find the best trade-off between functionalities, power,area, performance and technology.


Supported  operations: RSA  (up  to  4096  bits), ECC  (up  to  571  bits),  CRT,  Rabin Miller,  DSA/ECDSA,

primality test and key generation.


Features:

· High-level of scalability withsolutions implementing 4, 16, 64 or 256 multipliers

·Highly pipe-lined solution

·Available: ASIC, Actel, Altera, Xilinx

·Supports all arithmetic operations inboth fields F(p) and F(2m)

·Modular Addition/Subtraction/Multiplication/Division/Inversion

·Supports arbitrary data/key sizes up to4096 bits

·Point Doubling/Addition/Multiplicationfor ECC-F(p) and F(2m)

·NIST recommended Curves are supported:

·Prime Field: P-192, -224, -256, -384,-521

·Binary Field: K/B-163, -233, -283,-409, -571

·Supports a lot of standard PKalgorithms: Modular Exponentiation, RSA and CRT, Elliptic Curve Cryptography(ECC), Digital Signature Algorithm (DSA) and Elliptic Curve DSA (ECDSA),Primality Test (Rabin-Miller) for Key Generation

·100% CPU Offload: Pre- andpost-processing automatically executed (no need of external SW resources)

·Control Interface: APB-compliant CPUInterface

·Data interface: Generic MemoryInterface controlled by an internal scatter-gather DMA

·Off-the-shelf and silicon-provensolution

·Optional add-on for protection againstSPA/DPA


Deliverables:

·Netlist or RTL, Scripts for synthesis

·Self-checking TestBench based on FIPSvectors


(3) Random Number Generator

The  random  number  generator  is an  essential  part  of  all  secure systems.  we  provides  a  True Random NumberGenerator (TRNG) and a Deterministic Random Bit Generator (DRBG). The DRBG usesthe hash function or AES primitive compliant with NIST 800-90A.


features:

·True/Deterministic random numbergeneration

·Deterministic mode available forpseudo-random simulation

·Configurable buffer memory (width,depth)

·Convenient interfaces for easyintegration (AHB/APB, AXI-4, fifo, …)

·TRNG compliant with NIST800-22 testsuite

·DRBG compliant with NIST800-90A(Hash_DRBG or AES_DRBG)



(4)Hash engine

Our  Hash  core  supports  several hashing  algorithm  widely  used  in cryptography  world.  The  hash  core is especially used for data integrity verification, authenticationand secure boot.



Hashing modes: SHA-1, SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512), HMACand MD5.


features:

·Supports SHA-1, SHA-224, SHA-256,SHA-384, SHA-512, MD-5, HMAC

·Generic parameters allow customers toget the best trade-off between area and functionalities and performances in allconfigurations

·64 or 80 cycles per 512- or 1024-bitchunk depending on the algorithm

·Unused features result in optimizedlogic

·Low power feature

·Easy to integrate interfaces:

·AMBA (AHB, AXI) with optional DMA

·AMBA (APB, AXi-4 Lite) ConfigurationInterface

·Available: ASIC, Actel, Altera, Xilinx

·API for reference


(5)AES


- AES-GCM :The  AES-GCM  IP core  provides  high  speed  AES encryption andauthentication with GCM and GMAC.

This  encryption  mode  allows reaching  high throughput with low latency and is, therefore,used in  many  networking  applications.  The  IP core  is scalable,  and  can  be configured  to  reach  the bandwidth needed  (upto 100Gbps). It is compliant with the recommendation SP800-38D from NIST.


- AES-CCM :The  AES-CCM  IP  core  provides high  speed  AES encryption and authentication with CCMand CMAC.

This  cipher  mode  is  used  in wireless  protocols  and others.  It  is compliant  with  the  recommendation SP800-38C fromNIST.


- AES-Flex engine :Our AES Flex engine supports a wide range of cipher modesand all key sizes (128-bit, 192-bit and 256-bit). The  AES engine  is  flex ible  and  scalable.  It can  be  configured  to  support  specific modes  with  required

performance, providing the most compact solution.

Cipher modes: CTR, CCM/CMAC, GCM/GMAC, XTS, EBC, CBC,OFB, CFB, OMAC


有需要的短信给我,是付费的啊。

发表于 2014-9-1 10:43:54 | 显示全部楼层
代理商? 原厂是以色列的公司?
发表于 2014-9-1 18:01:06 | 显示全部楼层
需要harden么,提供pr服务,
发表于 2014-9-27 19:08:34 | 显示全部楼层
感谢楼主分享!!!
发表于 2018-9-27 19:30:57 | 显示全部楼层
想找随机数发生器文章,
谢谢楼主分享
您需要登录后才可以回帖 登录 | 注册

本版积分规则

关闭

站长推荐 上一条 /3 下一条

小黑屋| 关于我们| 联系我们| 在线咨询| 隐私声明| EETOP 创芯网
( 京ICP备:10050787号 京公网安备:11010502037710 )

GMT+8, 2024-4-19 18:42 , Processed in 0.027903 second(s), 8 queries , Gzip On, Redis On.

eetop公众号 创芯大讲堂 创芯人才网
快速回复 返回顶部 返回列表