CYBER SECURITY IP CORE PRODUCTS FINALLY AVAILABLE
Cyber Security
We are very proud to share with you that our Cyber Security IP Cores are finally available for our customers. The algorithms implemented by the different IP Cores are compliant to the specifications reported by the corresponding standards, and currently the portfolio offers hardware accelerators for Advanced Encryption Standard (AES) cipher, for symmetric-key algorithms, compliant with NIST FIPS 197 and implementing several cipher modes as for NIST SP 800-38A/B/C/D/E, for Secure Hash Algorithm (SHA) for hash functions, both SHA2 and SHA-3 compliant with FIPS 180-2/3/4 and FIPS 202 NIST standards, for Random Number Generator (RNG) primitive, and for Elliptic-Curve Cryptography (ECC), useful for development of ECDSA, ECIES and ECDH high-level cryptographic schemes.