All IPs > Security IP > Cryptography Software Library
In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.
Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.
The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.
At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.
The RV12 RISC-V Processor is a versatile, highly configurable single-issue CPU designed for the embedded market, adhering to the RV32I and RV64I RISC-V instructions. This processor implements a Harvard architecture, enabling simultaneous access to instruction and data memory, enhancing overall performance. The RV12 is part of Roa Logic's extensive CPU family, which is characterized by flexibility and underpinning efficient resource utilization for embedded systems.
PUFrt is a foundational security solution that equips semiconductors with hardware root key generation and storage, essential for establishing a Hardware Root of Trust. It introduces a 1024-bit PUF-based identification code and a true random number generator (TRNG) that comply with stringent cryptographic standards, enhancing data protection against diverse threats. The design includes secure OTP storage and an anti-tamper shell, providing a robust defense against physical attacks. Assured compatibility with varied architectures allows PUFrt to integrate seamlessly, offering key provisioning and securing critical data across system platforms.
Post-Quantum Software Library General purpose FIPS 140-3 certified cryptographic library for a wide variety of applications. PQCryptoLib is designed to provide the latest standardized post-quantum and classical algorithms in a software environment. With a configurable, secure and easy to use API, it’s optimized for crypto-agility, particularly when it comes to FIPS compliant hybrid solutions and protecting against harvest-now-decrypt-later attacks. The goal of PQCryptoLib is to help organizations transition to quantum resistance in a manageable, easy-to-integrate solution.
Topaz FPGAs from Efinix are designed for volume applications where performance and cost-effectiveness are paramount. Built on their distinctive Quantum® compute fabric, Topaz devices offer an efficient architecture that balances logic resource availability with power minimization. Suitable for a plethora of applications from machine vision to wireless communication, these FPGAs are characterized by their robust protocol support, including PCIe Gen3, MIPI D-PHY, and various Ethernet configurations. One of the standout features of Topaz FPGAs is their flexibility. These devices can be effortlessly adapted into systems requiring seamless high-speed data management and integration. This adaptability is further enhanced by the extensive logic resource options, which allow increased innovation and the ability to add new features without extensive redesigns. Topaz FPGAs also offer product longevity, thriving in industries where extended lifecycle support is necessary. Efinix ensures ongoing support until at least 2045, making these FPGAs a reliable choice for projects aiming for enduring market presence. Among the key sectors benefiting from Topaz's flexibility are medical imaging and industrial control, where precision and reliability are critical. Moreover, Efinix facilitates migration from Topaz to Titanium for projects requiring enhanced performance, ensuring scalability and minimizing redesign efforts. With varying BGA packages available, Topaz FPGAs provide comprehensive solutions that cater to both the technological needs and strategic goals of enterprises.
Post-quantum cryptography library for memory-constrained platforms PQCryptoLib-Embedded is a version of PQCryptoLib, PQShield’s library of post-quantum cryptographic algorithms, which is designed for microcontrollers or memory-constrained platforms. The library is highly configurable at build time, which means binary size and memory footprint can be minimized, making this product ideal for constrained devices. Efficiency is important in implementing ML-DSA and ML-KEM, especially for devices or networks requiring quantum-safe TLS communication such as in IoT environment. As a standard software library, PQCryptoLib-Embedded is a versatile tool for developing post-quantum protocols in memory-constrained situations.
The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.
The Alcora V-by-One HS is a compact and efficient FMC daughter card that brings the V-by-One HS interface to any FPGA development board with high-speed transceivers. Supporting up to 16 RX and TX lanes when combining two cards, Alcora excels in transmitting high-resolution video signals, accommodating resolutions up to 4K at 120Hz or 8K at 30Hz. Alcora's design is flexible, available with either 51-pin or 41-pin headers, catering to different setup requirements. It includes two clock generators to sysnthesize reference clocks for the transceivers, ensuring reduced jitter on recovered RX clocks. The V-by-One HS technology is perfect for high-frame-rate video applications in the flat panel display sector. This versatile card is targeted at manufacturers and developers looking to implement high-speed, high-quality video interfaces within their products. Its robust design and high performance make it an excellent choice for embedding into video-centric FPGA applications, ensuring stellar performance in visually demanding environments.
The AndeSoft software stack provides a comprehensive suite of software components such as operating systems, Linux kernels, various libraries, and middleware. These components aim to expedite the customer's product development cycle, enabling them to focus more on application-specific requirements instead of general development concerns. The software is optimized for AndesCore processors and helps to reduce time-to-market without compromising performance.
The ATEK250P3 is designed to function as an absorptive Single Pole Double Throw (SPDT) switch. Its operating frequency ranges from low frequencies up to 14 GHz. Noteworthy attributes include a minimal insertion loss of 1.5 dB and a high isolation of 43 dB, ensuring superior performance in managing signal routing tasks. Additionally, it features an impressive IP1dB of 27 dBm and an IIP3 of 44 dBm, making it a highly reliable choice for RF applications. With a positive control voltage and encased in a compact 3×3 mm QFN package, it provides ease of integration into various electronic systems. This product is optimal for use in telecommunication systems and devices that require efficient and reliable switching capabilities at microwave frequencies. The ATEK250P3 stands out due to its robustness and efficiency, offering solutions that enhance performance in RF systems while minimizing power consumption and signal loss. It is a critical component designed to meet the high standards of modern communication networks, ensuring seamless integration and operation.
The Dukosi Cell Monitoring System (DKCMS) is an advanced solution designed to enhance the performance, safety, and sustainability of batteries, particularly for high-power applications. This innovative system employs a Dukosi DK8102 Cell Monitor per cell, offering precise voltage and temperature data collection. By using the proprietary C-SynQ communication protocol, cell data is transmitted synchronously via a single bus antenna to a DK8202 System Hub, maintaining communication even amid dynamic conditions. This architecture facilitates real-time monitoring, ensuring cells operate within safe parameters while optimizing the battery's overall performance. DKCMS's contactless connectivity stands out, eliminating the complexity of traditional wire harnesses and simplifying integration. This design reduces the number of components needed, which underscores reliability and reduces cost. Additionally, the contactless communication provides robust data transmission with predictable latency, catering to complex, safety-critical environments where precision and reliability are paramount. Scalability is another essential feature of the DKCMS, enabling seamless adaptation to a range of applications from electric vehicles to energy storage systems. The system supports up to 216 cells, allowing flexibility in design without extensive reengineering. This allows for efficient upscaling or downscaling according to specific project requirements, ensuring that the solution can evolve alongside changing technological or market landscapes.
The DK8x02 Evaluation Kit serves as a powerful tool for developers looking to integrate Dukosi's advanced cell monitoring technology into their battery management systems. This kit provides a user-friendly interface for evaluating the capabilities of the Dukosi Cell Monitoring System (DKCMS), facilitating the development of next-generation batteries. With the ability to connect multiple Cell Monitor boards via a System Hub, the kit offers a comprehensive setup for testing and exploring the potentials of Dukosi's solutions. This evaluation kit includes everything needed for thorough testing and design prototyping - from USB connections to a Windows-compatible software GUI that visually represents the battery setup as a digital twin. This component of the kit empowers developers to refine and optimize their designs effectively, enabling a rapid transition from concept to market. By offering robust tools for debugging and system optimization, the DK8x02 Evaluation Kit ensures that developers can quickly address challenges and determine the best configurations for their needs. This enhances the overall development process, streamlining the creation of innovative battery solutions and cutting-edge battery-powered applications.
Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments
CoMira Solutions' MACSec IP is designed to provide robust security and integrity to networking applications, adhering to the IEEE 802.1AE-2006 MACSec standard. This IP enables secure and reliable transmission of data over LAN, safeguarding against disruption and unauthorized interception. Built with a time-division multiplexed cut-through architecture, the IP offers high throughput for multiple channels while maintaining synchronization-independent operation, thereby providing efficiency without compromising on security. Features include support for FIPS-compliant encryption algorithms, flexible multi-port operation, and customizable security associations, making it an ideal solution for secure networking environments.
Helion's SHA hashing cores offer powerful solutions for secure data verification needs, featuring implementation of widely recognized hash functions such as SHA-1 and the SHA-2 family, which includes SHA-224, SHA-256, SHA-384, and SHA-512. These one-way cryptographic functions generate fixed-length message digests for data verification, ensuring data integrity and authentication in digital signatures, security protocols like IPsec, and TLS/SSL. These cores are built to cater to different processing demands, providing both high-performance and resource-efficient options. For applications that require rapid processing with minimal area impact, Helion's FAST hashing core family achieves data rates up to 4Gbps. Alternatively, their TINY hashing core family is designed to handle low power and data rate applications, making it suitable for less demanding environments with space constraints. Helion's SHA hashing solutions are versatile, supporting various platforms including Xilinx, Altera, and Microsemi FPGAs, as well as ASIC implementations. Their efficient architecture ensures ease of integration without compromising on performance, catering to a range of applications from simple data integrity checks to complex cryptographic procedures.
This thermal noise-based random bit generator leverages the inherent unpredictability of thermal noise to create truly random sequences of bits, vital for security protocols and cryptographic applications. Operating within a frequency range of 0.2 to 2 MHz, the generator is engineered for efficient power use with a quiescent current draw of around 50 uA. The compact design and reliable output make it suitable for applications where secure random bit generation is a necessity, such as in secure communications and data encryption systems.
The ATEK350N4 is an Analog Variable Voltage Attenuator (VVA) designed for optimal frequency performance, covering a wide range from 2 GHz to 40 GHz. This VVA introduces precise attenuation control with a minimal insertion loss of 1.9 dB while providing an extensive attenuation range up to 27 dB. Its linear operation enhances compatibility and integration into varied RF applications that require signal amplitude adjustments for optimal system performance. Operating at a negative control voltage, this attenuator is encapsulated in a compact 4×4 mm QFN package, facilitating ease of use in space-constrained environments. It supports robust IP1dB metrics at 22 dBm and an impressive IIP3 of 32 dBm, confirming its high performance in complex RF systems. Designed with advanced technology, the ATEK350N4 is suitable for telecom infrastructure, radar systems, and other critical applications that demand precise signal control over extensive bandwidths. Its adaptability to varying operational scenarios makes it a versatile component in enhancing signal quality and reducing distortion across different domains.
The DKCMS Core integrates seamlessly into high-performance battery packs, offering a robust and innovative cell monitoring solution. This core functionality supports precise, per-cell measurements and robust data processing, which are transmitted to the main BMS via the System Hub using Dukosi's unique C-SynQ protocol. The core is designed to maintain synchronization and accurateness even in rapidly changing environments, bolstering the security and reliability of the battery management system. This core system is tailored specifically for high-capacity battery applications, providing solutions that augment the overall safety, efficiency, and life span of battery packs. With its adaptive channel hopping and automatic or manual channel masking features, the DKCMS Core ensures uninterrupted and secure data communication. Additionally, its wake-on-fault feature is essential for systems that need to maintain vigilance even during low power conditions. Notably, the core's scalability feature allows it to manage substantial battery capacities, making it suitable for everything from vehicles to stationary storage solutions. The design also incorporates elements like passive cell balancing and fault reporting which contribute toward improved operational efficacy and longevity, resulting in lower operational costs and increased robustness of the battery systems in which it is implemented.
The Video Anonymization technology developed by Gyrus AI is an innovative solution dedicated to enhancing privacy in video data analytics. This solution efficiently anonymizes individuals within video footage without compromising on the video's overall quality or informative content. The technology distinguishes itself by employing advanced AI algorithms that detect and mask sensitive data, ensuring compliance with privacy regulations across different regions. Gyrus AI's Video Anonymization is adaptable to a wide range of applications, from corporate security to public safety and surveillance. It integrates seamlessly with existing video systems, providing an essential layer of security without necessitating major infrastructural changes. The anonymization process is conducted in real-time, allowing for immediate analysis and response, a crucial factor in dynamic environments like retail and public spaces. What further sets this solution apart is its ability to maintain operational efficiency without high computational demands. By leveraging edge computing capabilities, the Video Anonymization tool minimizes latency and enhances processing speed, ensuring that high-quality anonymized videos are produced swiftly and efficiently.
OpenCryptoLinux is a Linux-based operating system tailored for the OpenCrypto hardware framework. It integrates seamlessly with OpenCryptoHW, providing a comprehensive software stack necessary for cryptographic operations. By aligning with Linux's robust capabilities, this OS ensures efficient management and execution of cryptographic processes. It offers a user-friendly interface and supports a wide range of hardware configurations, emphasizing flexibility and reliability. OpenCryptoLinux caters primarily to developers and organizations focusing on building secure and scalable solutions on open-source platforms.