Find IP Sell IP About Us Contact Us
Log In
Something here

All IPs > Security IP > Cryptography Cores

Cryptography Cores: Advanced Security IP Solutions

In today's interconnected world, the importance of secure communication and data protection cannot be overstated. Cryptography cores are a crucial subset of semiconductor IPs designed to provide foundational security solutions across a variety of electronic systems. At their core, these IPs implement complex algorithms that ensure the confidentiality, integrity, and authenticity of data being processed and exchanged.

The cryptography cores available in this category offer a diverse range of features tailored to different security needs. From symmetric-key algorithms like AES to asymmetric-key systems such as RSA and ECC, these cores ensure that systems can securely encrypt and decrypt information, protecting it from unauthorized access and tampering. By embedding these cryptographic functions directly into hardware, it becomes possible to achieve faster processing speeds and higher levels of security compared to software implementations.

These semiconductor IPs are widely used in applications where data security is paramount. This includes, but is not limited to, industries such as finance, telecommunications, and healthcare. Devices utilizing cryptography cores can range from secure payment systems, ensuring safe financial transactions, to mobile devices for secure communications, to medical devices that safeguard sensitive health information. Additionally, with the rise of the Internet of Things (IoT), cryptography cores are increasingly crucial in providing secure connections for a myriad of smart devices.

By integrating cryptography cores into your designs, you not only improve security but also future-proof your products against many potential vulnerabilities. As security threats continue to evolve, having robust cryptography solutions is essential for maintaining trust and reliability in your products and services. Whether you're developing a new application or enhancing an existing one, our category of cryptography cores offers the semiconductor IP solutions you need to meet today's stringent security demands.

All semiconductor IP
37
IPs available

TRNG/AES/DES/3DES/HASH/SHA/RSA

Overview: Cybersecurity IPs offer a range of essential security features to protect your digital assets and sensitive information. From True Random Number Generators (TRNG) to advanced encryption algorithms like AES, DES, 3DES, and cryptographic hash functions like SHA, as well as RSA for secure key exchange and digital signatures, the IPs provide a comprehensive suite of tools to safeguard your data. Key Features:  True Random Number Generator (TRNG): Generates unpredictable and unbiased random numbers for cryptographic applications.  Advanced Encryption Standard (AES): Provides robust encryption with symmetric key algorithms for securing data.  Data Encryption Standard (DES) and Triple DES (3DES): Implement legacy encryption algorithms for data protection.  Hash Functions: Includes secure cryptographic hash functions like SHA (Secure Hash Algorithm) for data integrity verification.  RSA: Enables secure key exchange, encryption, and digital signatures for secure communication. These cybersecurity IPs are designed to meet the stringent security requirements of modern applications, ensuring the confidentiality, integrity, and authenticity of your data.

Plurko Technologies
79 Views
All Foundries
Cryptography Cores
View Details Datasheet

AES Block Cipher IP

The AES Block Cipher core from Alma Technologies implements highly efficient and flexible cryptographic operations, suitable for bolstering data security across various digital platforms. This core addresses a multitude of secure processing needs, ranging from enterprise safety measures to protecting personal user information in smart technologies. By accommodating the most prevalent modes of AES operation, this IP core is poised for effortless integration into numerous ciphered systems. Its ability to manage secure transactions and data patterns underscores its value in a security-first digital architecture, vital for data-heavy processes requiring encryption integrity and resource scalability within the tech industry.

Alma Technologies
39 Views
Cryptography Cores
View Details Datasheet

DAES XTS

The DAES XTS IP Core is a lightweight yet powerful cryptographic processor implementing the AES-XTS mode as per IEEE Std 1619. Providing support for both 128 and 256-bit key sizes, this co-processor is designed for swift memory block access and encryption processes. Its design ensures compliance with modern cryptographic requirements, making it highly suitable for secure data storage applications.

Digital Core Design
24 Views
All Foundries
Cryptography Cores
View Details Datasheet

BCH Error Correcting Code ECC

The BCH Error Correcting Code ECC is an advanced system for error detection and correction, employing sophisticated Galois Field techniques. With this IP, encoding and decoding are executed asynchronously, ensuring zero latency. Engineered for scenarios demanding low power and minimal hardware usage, it uses gate-level logic without relying on stochastic processes or clocked sequences. Configurability is a highlight of the BCH ECC, with end-users able to determine parameters related to the number of errors correctable and specific code attributes like bit shortness. This flexibility allows it to handle varying error rates, adapting to different system requirements. Such properties make it a preferred choice for systems where adaptability is key, particularly in storage solutions or sensitive communications. The applications span a variety of fields, from high-speed optical communications and SSD controllers to in-situ memory repair in ASIC architectures. The ability to predict uncorrectable errors further enhances system reliability, making the BCH ECC indispensable in maintaining high data integrity across broad technology ecosystems.

Secantec, Inc.
22 Views
All Foundries
Cryptography Cores
View Details Datasheet

HDCP Encryption-Decryption Engine

The HDCP (High-bandwidth Digital Content Protection) Encryption-Decryption Engine offered by Trilinear is crafted for robust digital content protection. This engine is engineered to provide secure transmission of protected digital media, adhering to stringent content security standards. Designed to integrate seamlessly with various digital communication systems, it ensures that high-value digital content remains secure from unauthorized access or interception. In today's digital environment, maintaining the security of IP content during transmission is paramount. Trilinear's engine facilitates this through advanced encryption methodologies, which are essential across industries including film, broadcast, and digital media platforms. The engine's design is centered on delivering unparalleled security while maintaining high data transfer rates, a critical balance for sectors dealing with sensitive media content. The integration of this engine supports developers in achieving compliance with the latest content protection standards. It is structurally designed to optimize encryption processes for various multimedia applications, ensuring reliability and ease of use. As digital content distribution continues to expand, the HDCP Engine serves as a vital tool for maintaining content integrity and security.

Trilinear Technologies
22 Views
All Foundries
Cryptography Cores
View Details Datasheet

Post-Quantum Cryptography IP

The Post-Quantum Cryptography (PQC) IP developed by Secure-IC represents a giant leap towards securing systems against future quantum threats. This IP is designed with a hybrid hardware-software architecture, making it adaptable for a range of applications requiring quantum-resistant security features. At its core, this IP includes a hardware accelerator optimized for lattice-based algorithms combined with a software library tailored for specific algorithms like the Crystals Kyber. This PQC solution is engineered to meet the demands of security standards well into the quantum computing age, offering high-resistance to potential side-channel attacks such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA). Additionally, the design supports secret key lengths of 512, 768, and 1024 bits, providing tunability in performance and power, thus catering to the precise needs of various applications. Equipped with an AMBA interface, the PQC IP facilitates integration within existing systems, reinforcing them with the necessary cryptographic operations such as key generation, key encapsulation, and key decapsulation. This makes Secure-IC's PQC IP instrumental for industries looking to future-proof their devices against emerging quantum threats, underscoring its importance as part of a forward-thinking security strategy.

Secure-IC
22 Views
Cryptography Cores
View Details Datasheet

Reed Solomon Error Correcting Code ECC

Reed Solomon Error Correcting Code ECC is a powerful tool designed to maintain data integrity across storage and transmission systems. Its encoding and decoding processes are entirely asynchronous, allowing operations with zero latency, critical in environments where speed is of essence. By leveraging the deep math behind Galois Fields, this IP code provides robust mechanisms for correcting multiple symbol errors, making it essential for scenarios plagued by high error rates. An attractive feature of this code is its complete configurability, enabling users to set various parameters such as the maximum count of correctable errors or the bit length of encoded symbols. Supporting multiple error correction and detection thresholds, the Reed Solomon ECC adapts to the varying demands of data-driven technologies, from communication error correction in datacenters to robust data recovery solutions in RAID systems. Applications benefiting from this IP include digital data storage systems, high-speed communication lines, and any electronic infrastructure where data integrity is paramount. Its reliability in correcting complex error patterns ensures seamless data processing, supporting the demand for consistency and accuracy in modern digital environments.

Secantec, Inc.
22 Views
All Foundries
Cryptography Cores
View Details Datasheet

xQlave Post-Quantum Cryptography

xQlave is designed to withstand the future capabilities of quantum computing by offering secure implementations of post-quantum cryptographic algorithms. It features the ML-KEM (Kyber) for key encapsulation and ML-DSA (Dilithium) for digital signatures. These cryptographic solutions are based on NIST-standardized algorithms which are created to thwart quantum computer attacks. With a focus on small resource footprint, maximal performance, or optimal balance, this product ensures secure key exchanges and digital signatures in post-quantum environments. The xQlave family not only offers quantum-resilient security but also embraces hybrid models, combining classical cryptography with quantum-resistant algorithms to enhance current security protocols gradually. xQlave is particularly suited to systems needing future-proof security solutions as quantum threats become more tangible, providing a safeguard for today’s encryption methodologies by integrating seamlessly with existing infrastructure.

Xiphera Ltd
22 Views
All Foundries
Cryptography Cores
View Details Datasheet

AES Encrypt/Decrypt 128/192/256

The AES Encrypt/Decrypt IP provides advanced encryption and decryption capabilities for secure communications. This IP module supports 128, 192, and 256 bit encryption standards, ensuring a high level of data protection suitable for many sensitive applications. Leveraging Galois Field computations, the module achieves both high performance and low power consumption characteristics. What sets this AES IP apart is its parallel key calculation and data encryption process. By running key computations simultaneously with data operations, it significantly reduces the number of required clock cycles, thus enhancing efficiency. This parallel design applies equally to both encryption and decryption operations, making it highly efficient for systems where time and resource management are critical. Designed for ease of integration, the IP runs fully verified RTL code and is delivered clean and ready for deployment. Applications demanding high security, such as financial transactions and secure communications, benefit greatly from its robust encryption capabilities, ensuring data confidentiality and integrity.

Secantec, Inc.
21 Views
All Foundries
Cryptography Cores
View Details Datasheet

Flash Protection Series

The Flash Protection Series expands PUFsecurity's Hardware Root of Trust and Crypto Coprocessor to secure additional SoC components. This series provides enhanced protection for various flash solutions, including embedded and external memory types, using PUF-based chip fingerprinting to ensure security. The series extends security across the SoC, safeguarding firmware and proprietary software assets against unauthorized access. Designed to simplify integration within major foundry processes, the Flash Protection Series offers reliable security solutions to protect crucial assets within commodity flash, enhancing overall SoC security.

PUFsecurity
21 Views
All Foundries
Cryptography Cores
View Details Datasheet

PSA Compliant Crypto API

Tiempo Secure's PSA Compliant Crypto API is tailored to offer a modular and user-friendly interface for executing secure cryptographic operations. This API simplifies complex cryptographic tasks, delivering a compact yet versatile library that consumes minimal on-chip resources. By adhering to PSA Certification standards, it ensures that embedded systems maintain high levels of security with easily integrable cryptographic functionalities. The API includes efficient programming interfaces designed for cross-platform use, making it an ideal choice for developers seeking secure and compliant cryptographic solutions. By offering SRAM-based PUF key storage and a NIST SP-800 90A compliant DRBG with 256-bit security, it addresses the spectrum of security requirements while providing a reliable source of randomness for secure operations. This Crypto API stands out due to its optimized SHA-256 implementation and comprehensive logging features, aiding developers in building security measures without extensive overheads. Its portability across different environments further enhances its utility, making the PSA Compliant Crypto API a cornerstone for embedding security into a wide variety of digital applications.

Tiempo Secure
21 Views
All Foundries
Cryptography Cores
View Details Datasheet

DES/3DES Ultra-Compact IP Core

The DES/3DES IP Core is designed to deliver efficient data encryption for ASIC and FPGA applications, aligning with the Data Encryption Standard (DES). It processes 64-bit blocks and supports multiple cipher modes including ECB and CBC. The ultra-compact design excels in conserving resources, occupying just 3K gates for triple DES implementations while maintaining high throughput rates of up to 3 Gbps. Implemented for fast deployment, this core facilitates secure mobile communications and secure financial transactions, meeting the highest standards set by national security protocols such as NIST FIPS 46-3.

IP Cores Inc.
20 Views
Cryptography Cores
View Details Datasheet

Galois Error Correcting Code

Galois Error Correcting Code leverages Galois Field operations to provide efficient error correction capabilities. This code is integral in maintaining data accuracy across communication channels, particularly where errors are more likely due to noise. By employing Galois Field mathematics, the IP performs complex data redundancy operations to both identify and amend erroneous values within transmitted or stored data. The code is designed to support operations that are inherently asynchronous, with no need for clock cycles, making it suitable for high-speed applications where latency can be a critical bottleneck. The design eliminates the use of traditional feedback loops, further optimizing data throughput by ensuring that operations proceed seamlessly without interruptions. These properties make it an ideal choice for use in systems susceptible to data corruption, especially those requiring rapid recovery and minimal resource consumption. In practical applications, the Galois Error Correcting Code excels in sectors like telecommunications and data-heavy environments where maintaining data integrity can be challenging due to the constant threats posed by electromagnetic interference and other noise sources. Its ability to manage and correct multiple bit errors ensures robust protection for data transmission across various multi-range communication links.

Secantec, Inc.
20 Views
All Foundries
Cryptography Cores
View Details Datasheet

Hash Function IP

The Hash Function IP core by Alma Technologies plays a central role in ensuring data integrity throughout computing environments. Implementing essential hash algorithms such as MD5, SHA-1, and SHA-256, the core adapts to a variety of digital security settings, from encryption frameworks to data validation platforms. Such versatility makes it a critical component in safeguarding data transitions across electronic communications and digital contract validation, highlighting Alma Technologies' commitment to security within technological infrastructures. By seamlessly integrating these algorithms, it facilitates robust data hashing procedures, thus supporting advanced authentication and verification processes in contemporary digital systems.

Alma Technologies
20 Views
Cryptography Cores
View Details Datasheet

MACsec IP Core

Comcores’ MACsec IP Core emerges as a cutting-edge solution in cybersecurity, providing an impressive reduction in size while enhancing operational efficiency. This state-of-the-art IP core meets the increasing demand for secure, yet resource-friendly networking solutions. By trimming down the physical footprint, the core offers industry-leading performance with minimized resource consumption, aligning perfectly with modern technological requirements. This product addresses the critical needs for advanced encryption and data protection, focusing on maintaining high data throughput rates while ensuring top-level security. The core’s adaptable architecture supports a variety of use cases, making it equally suitable for small-scale deployments as well as large, complex networks. Its innovative design allows for seamless integration, thereby enhancing existing infrastructure while reducing developmental overhead. Designed specifically for Ethernet-based networks, the MACsec IP Core is set apart by its flexibility and robust security features. It helps organizations protect data against theft and tampering, ensuring that sensitive information remains confidential and intact. This dual emphasis on security and performance makes the MACsec IP Core a pivotal addition to any enterprise looking to bolster its network security strategies.

Comcores
20 Views
Cryptography Cores
View Details Datasheet

SHA-3 Crypto Engine

The SHA-3 Crypto Engine from Tiempo Secure is engineered to deliver advanced hash functions required for modern cryptographic applications. This IP core is recognized for its high throughput and flexible configuration options, allowing it to meet diverse hashing requirements efficiently. By supporting all SHA-3 standard functions and offering extended output functionality, the engine provides robust solutions for data integrity and authentication. With its innovative 1 cycle per round processing, the SHA-3 Crypto Engine ensures rapid performance, optimizing the silicon resource use in a given application. Users can tailor the engine through software to specify the rate and number of rounds per operation, making it adaptable for various requirements. This flexibility in configuration meets the specific needs of each cryptographic task, allowing for effective scalability and integration within digital frameworks. The inclusion of acceleration for the Kangaroo Twelve algorithm and compatibility with a range of message lengths further expands its utility. This makes the SHA-3 Crypto Engine an effective tool for secure communications, providing enhanced resilience and speed in cryptographic procedures. Developers seeking to implement efficient and reliable security measures will find this engine instrumental in building secure systems.

Tiempo Secure
20 Views
All Foundries
Cryptography Cores
View Details Datasheet

DAES

The DAES IP is a versatile cryptographic co-processor that integrates seamlessly into APB, AHB, and AXI bus systems. It implements the Rijndael algorithm to offer robust encryption with key lengths of 128 and 256 bits. Various cipher block modes such as ECB, CBC, CFB, OFB, and CTR are supported, alongside an internal key expansion module. This makes it an ideal choice for secure data processing in a variety of technological ecosystems.

Digital Core Design
19 Views
Cryptography Cores
View Details Datasheet

Post-Quantum Cryptography (PQC)

Tiempo Secure's Post-Quantum Cryptography (PQC) solutions are geared towards securing sensitive data against the threats posed by quantum computing. Recognizing the need for a forward-looking approach to cryptography, these solutions incorporate cutting-edge algorithms designed to withstand quantum-level attacks. They provide comprehensive quantum-resistant features, including code signatures and key encapsulation. The PQC solutions utilize the LMS Code Signature and Crystals-Dilithium algorithms, ensuring robust digital signatures and secure code signing. These algorithms are part of NIST’s post-quantum cryptography standardization efforts, ensuring future-proof security in face of quantum challenges. Additionally, the Crystals-Kyber Key Encapsulation Mechanism offers a secure, hardware-accelerated method for protecting cryptographic keys, making it ideal for maintaining secure data transmission. These PQC solutions cater to the need for adaptable security strategies in a rapidly advancing technological landscape. Suitable for a variety of applications, including secure communications and network infrastructures, they are designed to integrate seamlessly into existing security frameworks, offering enhanced resilience and comprehensive protection for future generations of digital security needs.

Tiempo Secure
19 Views
All Foundries
Cryptography Cores
View Details Datasheet

DSHA2-384

Supporting APB, AHB, and AXI connectivity, the DSHA2-384 IP core efficiently accelerates SHA2-384 hash functions. It aligns with FIPS PUB 180-4 compliance, making it a choice solution for industries looking to adopt high-level security standards. This solution supports modes of 224, 256, and 384 bits, providing substantial flexibility for security-focused applications.

Digital Core Design
18 Views
Cryptography Cores
View Details Datasheet

FortiMac

FortiMac delivers a secure implementation of HMAC SHA2, offering superior protection against side-channel and fault injection attacks. Based on the Threshold Implementation (TI) approach, FortiMac sets the benchmark for safeguarding critical applications. It stands alone in its class, providing robust security for both hardware and software implementations, ensuring comprehensive protection against evolving threats.

FortifyIQ
18 Views
All Foundries
Cryptography Cores
View Details Datasheet

SphinX

SphinX provides high-performance AES-XTS encryption and decryption capabilities with independently functioning non-blocking channels. This product is engineered for data security, ensuring that data integrity and confidentiality are maintained without introducing significant latency. The dual-channel architecture allows simultaneous encryption and decryption processes, thus optimizing security without impacting throughput. This encryption solution is particularly beneficial for environments where data security is paramount, such as financial services, cloud computing infrastructures, and data centers. By maintaining high speed and low latency, SphinX ensures that the security processes do not slow down operations, providing a seamless security layer for continuous data handling. The balance of performance and security provided by SphinX makes it a reliable choice for organizations seeking robust protection without compromising system efficiency. It supports scalable data environments, allowing for secure data transfer that adapts to growing operational demands, ensuring data protection keeps pace with technological advancements.

ZeroPoint Technologies
18 Views
Cryptography Cores
View Details Datasheet

ECC

The ECC IP Core offers a high-performance solution for elliptic curve cryptography, essential in modern digital signature verification and generation. Integrated with ECDSA capabilities, it is designed to meet security protocols with an impressive size/performance balance. Point multiplication is supported, boosting its utility within secure communication channels.

Digital Core Design
17 Views
Cryptography Cores
View Details Datasheet

FortiCrypt

FortiCrypt offers state-of-the-art AES protection, securing devices against side-channel and fault injection attacks, including SIFA. Its robust design delivers unparalleled security without sacrificing performance, latency, or increasing gate counts. The core mechanism employs advanced masking methods that utilize finite field arithmetic, ensuring attack resistance without additional latency. The product's compliance with rigorous testing, both analytically and on physical devices, makes it a reliable choice for high-security needs. With options ranging from ultra-high performance to ultra-low power consumption, FortiCrypt caters to diverse requirements, including encryption for low-end CPUs.

FortifyIQ
17 Views
All Foundries
Cryptography Cores
View Details Datasheet

Reed Solomon Erasure Code

Reed Solomon Erasure Code offers a sophisticated approach to error correction, particularly ideal for RAID configurations and fault-tolerant systems. Engineered to operate asynchronously, this IP utilizes non-clock-dependent logic, achieving efficient data correction without introducing latency. By employing a symbol-based approach, each typified by the degree of a primitive polynomial, the system effectively manages error detection and correction processes crucial in environments facing high data integrity challenges. This IP is adept in configuring for specific use cases, allowing adjustments that determine the number of erasure corrections achievable, as well as the length of each symbol within data streams. Separate encoder pathways offer precision handling for each operation, alongside shared decoder circuits capable of simultaneous multi-symbol recovery, making it a versatile choice for systems where flexibility and fault tolerance are crucial. Applications for the Reed Solomon Erasure Code span from data protection strategies in large scale storage systems to ensuring stable data throughput in communication channels prone to noise. Its architecture makes it a vital component in datacenters and other infrastructures where predictable and error-resilient data management is a priority.

Secantec, Inc.
17 Views
All Foundries
Cryptography Cores
View Details Datasheet

True Random Number Generator (TRNG)

The True Random Number Generator (TRNG) IP by Tiempo Secure is a cornerstone for cryptographic applications, providing a digital source of randomness crucial for secure operations. Designed specifically for System on Chip (SoC) applications, TRNG ensures that cryptoprocesses such as key generation and encryption are rooted in true randomness. Meeting stringent standards, it complies with NIST-800-22, NIST-800-90B, and AIS31, establishing its credibility and robustness in ensuring data security. True randomness is vital for secure device operation, and TRNG provides this by offering a foundation for tasks such as digital signatures, key exchange, and secure communication protocols. Its compatibility with APB and AXI buses enhances its integration potential, allowing seamless incorporation into various existing systems. The extensive validation under FIPS-140-3 certification further underscores the reliability and trustworthiness of this security solution. Moreover, the TRNG is engineered to fit easily into secure protocol implementations, catering to needs in IPsec, MACsec, TLS/SSL, and more. By ensuring random number generation maintains high integrity, it supports not just current encryption methods but is also adaptable for future use cases, promising longevity in its application across evolving technological landscapes.

Tiempo Secure
17 Views
All Foundries
Cryptography Cores
View Details Datasheet

DSHA2-256

The DSHA2-256 IP core bridges to APB, AHB, and AXI buses, offering a universal method for accelerating the SHA2-256 hash function. Compliant with FIPS PUB 180-4 standards, it provides robust support for RFC 2104 HMAC native mode. This IP supports both 224 and 256-bit modes, delivering reliable hash function acceleration to meet various security application needs.

Digital Core Design
16 Views
Cryptography Cores
View Details Datasheet

DSHA2-512

Capable of connecting through APB, AHB, and AXI buses, the DSHA2-512 IP core is engineered to accelerate SHA2-512 hash functions. It complies with FIPS PUB 180-4 and supports variable HMAC applications according to RFC 2104. Offering 224, 256, 384, and 512-bit modes, it provides extensive scope for security applications demanding high assurance levels.

Digital Core Design
16 Views
All Foundries
Cryptography Cores
View Details Datasheet

eSi-Crypto

The eSi-Crypto suite offers a comprehensive range of security IP solutions optimized for both ASIC and FPGA systems. These IP cores facilitate high-speed cryptographic operations with low resource consumption, featuring tools such as a True Random Number Generator compliant with NIST 800-22 standards, and a variety of algorithms including AES, ECC/ECDSA, RSA, and SHA for robust encryption and authentication. Moreover, eSi-Crypto supports multiple bus interfaces for seamless integration, making it suitable for network security, financial transactions, and secure communications across different platforms.

EnSilica
16 Views
All Foundries
Cryptography Cores
View Details Datasheet

FortiPKA-RISC-V

The FortiPKA-RISC-V is a sophisticated public key accelerator designed to offload heavy computational duties from the CPU. It provides an exceptional balance of compactness and performance, utilizing a unique computation technology that negates the need for data transformations to the Montgomery domain. This allows the FortiPKA-RISC-V to achieve performance levels superior to alternatives, all while maintaining a small footprint. It's versatile enough to support a wide array of algorithms including RSA and elliptic curve cryptography, providing dependable protection against side-channel and fault injection attacks.

FortifyIQ
16 Views
45nm
All Foundries
Cryptography Cores
View Details Datasheet

MAC Privacy Protection IP

The MAC Privacy Protection IP core is a revolutionary product from Comcores, designed to significantly enhance Ethernet security by safeguarding data transmissions. This innovative IP core addresses emerging needs in cybersecurity, offering advanced measures without compromising network performance or efficiency. By implementing cutting-edge privacy protocols, it ensures data integrity and confidentiality across Ethernet connections, making it indispensable for applications operating in sensitive and critical environments. At its core, this IP product is engineered to shield against unauthorized access and cyber threats, providing a fortified layer of security. Its seamless integration with existing network setups allows for quick deployment and minimal disruption, ensuring that businesses can maintain robust security protocols without extensive modifications to current infrastructures. The design incorporates flexible configuration options, accommodating varying security demands. This product uniquely combines privacy with performance, achieving a streamlined, efficient footprint that reduces overhead typical of traditional security solutions. As the landscape of cybersecurity evolves, the MAC Privacy Protection IP stands as a vital component in maintaining secure communications across digital platforms, affirming Comcores’ leadership in security IP innovation.

Comcores
16 Views
Cryptography Cores
View Details Datasheet

AES IP Core

The AES IP Core offers an ultra-compact implementation of the Advanced Encryption Standard (Rijndael) specifically optimized for size and performance. This IP core supports a wide range of encryption modes including ECB, CBC, CFB, OFB, and CTR, with optional support for data integrity and power attack resistance features. The core is FIPS-197 certified, ensuring compliance with recognized security standards. With a configurable data interface capable of handling 8, 16, or 32-bit wide data operations, this versatile IP core can be integrated into various systems demanding secure data handling. Suitable for applications that require high data throughput while minimizing hardware footprint, the AES IP Core finds its utility in secure communication channels, secure storage systems, and various IoT applications.

IP Cores Inc.
15 Views
Cryptography Cores
View Details Datasheet

ECDSA Sign

Designed for optimal size and performance, the ECDSA Sign IP core uses elliptic curve cryptography for robust digital signatures. It supports a range of critical elliptic curves, furnishing it with the ability to provide unbreakable security, crucial for systems requiring verified authenticity.

Digital Core Design
15 Views
Cryptography Cores
View Details Datasheet

SHA-2 Crypto Engine

Tiempo Secure's SHA-2 Crypto Engine is designed to facilitate robust cryptographic hashing, necessary for ensuring data integrity and authenticity across varied applications. With support for SHA-256 and SHA-224, this crypto engine offers a flexible approach to implementing cryptographic security. It ensures swift processing with its 1 cycle per round architecture, making it suitable for environments where performance and speed are of the essence. The ability to manage SHA-256 state import and export, alongside granular message length support, makes the SHA-2 Crypto Engine versatile in its application. It seamlessly fits into existing systems via its APB and AXI bus compatibility, enhancing its utility across different platforms. This modularity and adaptability make it stand out, catering to the needs of developers looking to embed reliable cryptographic functionalities without excessive overhead. Internally, the engine manages padding, accommodating both pre-padded and raw message payloads, which simplifies integration into secure communication workflows. The SHA-2 Crypto Engine is an ideal choice for systems requiring cryptographic resilience, offering a turnkey solution that balances performance and security. Its design supports the development of secure devices in IoT, automotive, and other sectors where data security cannot be compromised.

Tiempo Secure
15 Views
All Foundries
Cryptography Cores
View Details Datasheet

DCRP1A

The CryptOne 100% secure cryptographic system leverages over two decades of expertise in creating secure, reliable cryptographic solutions. It offers a minimal silicon footprint while ensuring high-speed processing capabilities. The system is designed with resistance to power and timing attacks, making it a robust choice for secure environments. As a universally applicable solution, it fulfills the demanding security requirements of both the European Commission and the US National Security Agency guidelines.

Digital Core Design
14 Views
Cryptography Cores
View Details Datasheet

ECDSA Verify

Integrating elliptic curve cryptography, the ECDSA Verify IP core is designed for validating digital signatures with exceptional efficiency. It supports a wide selection of elliptic curves, ensuring unyielding security across various application sectors. This IP core is ideal for applications where digital signature authenticity is paramount.

Digital Core Design
14 Views
Cryptography Cores
View Details Datasheet

True Random Number Generator

Tiempo Secure's True Random Number Generator (TRNG) is a critical component in the realm of secure device operations, providing an unpredictable source for cryptographic protocols. Such true randomness is foundational in developing secure communication and data protection strategies. This TRNG stands out because of its thorough compliance with various stringent standards, including those from NIST and AIS, resulting in sound security support for various SoC applications. In systems where security is paramount, the role of a TRNG extends to generating secure keys, random nonces for secure exchanges, and random data for digital signatures. The inclusion of raw data access and comprehensive health tests, compliant with SP800-90b, FIPS140-3, and AIS31, ensures the highest levels of reliability and security for sensitive operations. This IP includes integration options for standard bus protocols like APB and AXI, making it adaptable to a range of system-on-chip architectures. The TRNG is thus not only a standalone solution but a seamless integrating component which elevates the overall security fidelity of cryptographic systems, offering robust random number generation that aligns with both current and emerging digital security needs.

Tiempo Secure
14 Views
All Foundries
Cryptography Cores
View Details Datasheet

Cryptographic Core

Crafted with precision, the Cryptographic Core is a versatile hardware IP solution tailored to bolster security for a multitude of applications. Built to manage cryptographic operations efficiently, it facilitates seamless encryption and decryption processes, ensuring that data remains secure at all times. Ideal for environments where security is paramount, this core supports various cryptographic algorithms and standards. The Cryptographic Core is structured to integrate effortlessly into existing systems, providing a turnkey solution for developers aiming to enhance system security. Its design is both compact and efficient, optimizing resource usage without compromising performance. The flexibility of the core allows it to be adapted to a wide range of devices, from small embedded systems to larger network infrastructures. Engineered to handle the demands of contemporary technology landscapes, the Cryptographic Core stands out with its robust performance and reliability. It ensures that sensitive information is protected from unauthorized access, leveraging advanced encryption mechanisms to offer peace of mind to users across industries, including finance, healthcare, and communications.

PQ Secure
13 Views
Cryptography Cores
View Details Datasheet