Find IP Sell IP Chip Talk About Us Contact Us
Log In

All IPs > Security IP > Cryptography Software Library

Advanced Cryptography Software Library Semiconductor IP Solutions

In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.

Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.

The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.

At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.

All semiconductor IP
15
IPs available

RV12 RISC-V Processor

The RV12 RISC-V Processor is a highly customizable, single-core processor that aligns with the RV32I and RV64I standards. Crafted for the embedded market, this processor is part of Roa Logic's robust family of 32-bit and 64-bit CPUs based on the RISC-V instruction set. The RV12 architecture employs a Harvard structure, enabling concurrent access to instruction and data memory, which boosts performance and efficiency. Designed to meet the demands of modern embedded applications, the RV12 employs a single-issue architecture, optimizing processing effectiveness without the complexity of multi-threading. This processing unit is compatible with a diverse set of applications, offering scalability and versatility while maintaining alignment with industry standard specifications. Additionally, the RV12 comes equipped with a full suite of supportive resources, including testbenches and in-depth documentation. Such features facilitate seamless integration and deployment in various applications, ranging from consumer electronics to more complex industrial uses.

Roa Logic BV
46 Views
CPU, Cryptography Software Library, IoT Processor, Processor Cores
View Details Datasheet

PSA Compliant Crypto API

The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.

Tiempo Secure
40 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details Datasheet

Securyzr Key Management System

The Securyzr Key Management System provides robust, secure key management services across embedded systems. It ensures secure boot, efficient key isolation, and anti-tampering measures, enhancing the trustworthiness of critical systems. Its design ensures data integrity and confidentiality, making it a core component for any secure system architecture. This comprehensive IP solution integrates with existing frameworks to support seamless security management.

Secure-IC
30 Views
All Foundries
All Process Nodes
Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators
View Details Datasheet

Alcora V-by-One HS Daughter Card

The Alcora V-by-OneĀ® HS Daughter Card is engineered to connect seamlessly with any FPGA development board equipped with high-speed transceivers, supporting advanced video applications with ease. This card supports amalgamation of two FMC cards, resulting in up to 16 lanes that can handle video resolutions as high as 4K at 120Hz or 8K at 30Hz. Versatile by nature, the Alcora card comes in two configurations: with either 51-pin or 41-pin headers, expanding its adaptability to various devices. It features two clock generators aimed at minimizing jitter in the recovered RX clock, thus ensuring reliable video transmission under high-speed operation conditions. V-by-OneĀ® HS, developed by THine Electronics, Inc., is a high-speed digital interface technology primed for the flat-panel display market. Its design easily supports the growing need for higher resolution and frame rate in modern displays, making it an ideal choice for high-definition video transmission projects. The Alcora daughter card enhances design flexibility and capability in developing next-generation video applications.

Parretto
28 Views
All Foundries
All Process Nodes
Cryptography Software Library, V-by-One, VESA
View Details Datasheet

MACSec IP

MACSec IP by CoMira Solutions is designed to safeguard network communications by implementing Media Access Control Security as defined by IEEE standards. By using a unique time-division multiplexed cut-through architecture, the MACSec IP ensures secure and efficient data transfer within local area networks. It supports a wide range of configurations including custom security associations and supports multiple ports for simultaneous data protection, thereby making it adaptable to diverse network topologies and security requirements.

CoMira Solutions
26 Views
Cryptography Cores, Cryptography Software Library, Security Protocol Accelerators
View Details Datasheet

ATEK250P3 (SPDT Switch)

The ATEK250P3 is an absorptive Single Pole Double Throw (SPDT) switch tailored for high-frequency applications, featuring a varied frequency range from low to 14 GHz. This versatile switch integrates superior isolation capabilities of up to 43 dB alongside a low insertion loss at 1.5 dB, making it highly efficient for managing signal paths in complex RF designs. Its integrated IP1dB of 27 dBm and IIP3 of 44 dBm confer robust performance in demanding scenarios. It operates with a positive control voltage, packaged in a compact 3x3mm QFN. The ATEK250P3 is designed for use in advanced telemetry, satellite communications, and test instrumentation systems, offering pivotal functionality for switching RF signals without introducing significant signal loss or distortion. Its design optimizes switches between signal paths while maintaining the integrity of the RF signals, ensuring minimal interference is introduced during the switch operation. Moreover, this switch's compact design and efficient performance metrics make it a flexible choice for engineers looking to improve their systems' performance metrics, particularly in frequency-agile applications. ATEK250P3's ease of use and reliability play key roles in facilitating seamless signal management across diverse RF environments.

Atek Midas
25 Views
AMBA AHB / APB/ AXI, Analog Multiplexer, Cryptography Software Library
View Details Datasheet

SHA Hashing for Secure Data Verification

Helion's SHA hashing cores offer powerful solutions for secure data verification needs, featuring implementation of widely recognized hash functions such as SHA-1 and the SHA-2 family, which includes SHA-224, SHA-256, SHA-384, and SHA-512. These one-way cryptographic functions generate fixed-length message digests for data verification, ensuring data integrity and authentication in digital signatures, security protocols like IPsec, and TLS/SSL. These cores are built to cater to different processing demands, providing both high-performance and resource-efficient options. For applications that require rapid processing with minimal area impact, Helion's FAST hashing core family achieves data rates up to 4Gbps. Alternatively, their TINY hashing core family is designed to handle low power and data rate applications, making it suitable for less demanding environments with space constraints. Helion's SHA hashing solutions are versatile, supporting various platforms including Xilinx, Altera, and Microsemi FPGAs, as well as ASIC implementations. Their efficient architecture ensures ease of integration without compromising on performance, catering to a range of applications from simple data integrity checks to complex cryptographic procedures.

Helion Technology Limited
25 Views
All Foundries
All Process Nodes
Cryptography Cores, Cryptography Software Library
View Details Datasheet

PQCryptoLib Embedded

Designed for memory-constrained applications, PQCryptoLib Embedded extends the capabilities of PQCryptoLib to environments like microcontrollers and IoT devices. This specialized library emphasizes configurability to optimize for minimal binary size and memory usage, essential in constrained computing environments. It offers secure post-quantum cryptographic algorithms suited for devices where resource allocation is a challenge.

PQShield
24 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

PQCryptoLib

PQCryptoLib is a comprehensive cryptographic library offering support for the latest post-quantum and classical algorithms. Certified under FIPS 140-3, this library is central to offering crypto-agility and protecting against potential 'harvest-now, decrypt-later' attacks. PQCryptoLib provides a secure API for integrating hybrid solutions within TLS 1.3. Its primary aim is to aid organizations in transitioning to quantum-resilient infrastructures seamlessly.

PQShield
23 Views
Cryptography Cores, Cryptography Software Library, Security Protocol Accelerators
View Details Datasheet

DK8x02 Evaluation Kit

The DK8x02 Evaluation Kit is an advanced tool designed for battery developers and designers to explore the capabilities of the Dukosi Cell Monitoring System. This kit allows users to quickly establish a cell network and begin testing in a controlled environment, providing insights into system performance and compatibility. Featuring intuitive software and comprehensive documentation, the evaluation kit supports the development of next-generation batteries, offering the necessary components such as cell monitors and a system hub for up to 216 cells. The DK8x02 Evaluation Kit is essential for fostering new designs that are efficient, cost-effective, and ready for market.

Dukosi
20 Views
Cryptography Software Library, Interrupt Controller, Peripheral Controller
View Details Datasheet

Dukosi Cell Monitoring System (DKCMS)

The Dukosi Cell Monitoring System (DKCMS) revolutionizes battery system operations by incorporating real-time, cell-specific data monitoring for enhanced safety and efficiency. With the capacity to improve battery management in electric vehicles and stationary energy storage systems, this system utilizes innovative technology to log events and data continuously. By eliminating complex wiring, DKCMS simplifies battery architecture while maintaining superior performance. The system offers a sustainable solution by enabling circular economy practices through detailed data insights collected over the battery lifecycle.

Dukosi
20 Views
Cryptography Software Library, Embedded Security Modules, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators
View Details Datasheet

PQSDK

The PQSDK is a versatile software development kit designed to simplify the prototyping and experimentation of both post-quantum and conventional cryptographic primitives. It integrates PQShield's PQCryptoLib library with OpenSSL and mbedTLS, two prominent cryptographic libraries. PQSDK is tailored to facilitate secure application prototyping and enable post-quantum enhancements in secure communication protocols, like TLS 1.3.

PQShield
20 Views
Cryptography Cores, Cryptography Software Library, Security Protocol Accelerators
View Details Datasheet

ATEK350N4 (VVA Attenuator)

The ATEK350N4 is an advanced Variable Voltage Attenuator (VVA), adept in managing a wide frequency range extending from 2 to 40 GHz. This attenuator exhibits an insertion loss of 1.9 dB and an attenuating range that supports varied levels of signal control without distinct steps, enabling fine-tuned signal management. With an IP1dB performance of 22 dBm and an IIP3 of 32 dBm, it operates efficiently under high-power conditions, benefiting RF designs requiring precise signal modulation over extensive frequency bands. Packaged in a 4x4mm QFN, it utilizes a negative control voltage. The design of the ATEK350N4 integrates seamlessly with communication systems where precision in signal control and modulation is paramount. Its application spans satellite communications, defense systems, and high-frequency test instruments, providing reliable performance over a broad spectrum. With unparalleled flexibility and control, the ATEK350N4 allows for the precise adaptation of signal levels, enhancing the performance of RF systems designed for next-generation telecommunication and radar solutions. Engineers benefit from its superior integration functionality, meeting the demands of complex RF designs and operations.

Atek Midas
17 Views
AMBA AHB / APB/ AXI, Audio Interfaces, Cryptography Software Library, Disk Controller
View Details Datasheet

DKCMS Core

The DKCMS Core provides a robust, contactless solution for monitoring high-voltage battery packs across various applications. With features supporting high accuracy per-cell voltage metrics and temperature measurements, the core facilitates seamless data processing to enhance the battery management system (BMS) operations. Utilizing the proprietary C-SynQ communication protocol, the DKCMS Core enables efficient, low-latency communication between cell monitors and a system hub, reducing component needs by eliminating complex wiring harnesses. Its design fosters scalability, allowing for significant flexibility in battery pack development and deployment across different market segments.

Dukosi
17 Views
Cryptography Software Library, Embedded Security Modules, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators
View Details Datasheet

Video Anonymization

Gyrus AI offers a Video Anonymization solution that employs state-of-the-art computer vision and deep learning techniques to ensure privacy in video surveillance. This technology utilizes intricate algorithms to mask, blur, or replace sensitive information in video footage, providing a reliable way to anonymize visual data without losing analytical value. The solution is particularly beneficial for organizations needing to comply with privacy regulations while simultaneously extracting valuable insights from video content. The Video Anonymization process has multiple levels of intensity, offering options such as face blurring or substitution with synthetic characters. This flexibility allows users to choose the appropriate level of privacy protection based on the specific requirements of their projects. Additionally, these models can be customized and deployed either on-premises or in cloud-based environments, ensuring versatility to meet varying IT infrastructure needs. By utilizing this IP, businesses can safely store, share, and analyze video data without breaching privacy regulations, turning anonymized data into actionable insights. This represents a forward-thinking approach to data security and compliance, effectively addressing the challenges of contemporary video surveillance and processing.

Gyrus AI
9 Views
Cryptography Software Library, Graphics & Video Modules, Interrupt Controller, Security Protocol Accelerators
View Details Datasheet
Chat to Volt about this page

Chatting with Volt