RSA Public Key Cryptography Exponentiation Accelerator
cryptosystem. It performs the Ae mod M calculation and therefore offloads the most computer-intensive operation of RSA from the main processor. The RSA cryptosystem can be used for public key encryption, decryption and signature/authentication. It is currently the most deployed public key scheme and is used in well-known standards such as SSL/TLS secure internet access, IPSec Virtual Private Networks and S/MIME secure email.
The key advantage of the IPX-RSA IP-Core is its low footprint, thanks to an efficient balance between logic fabric and embedded RAMs and Multipliers.
Taking advantage of its high operating frequency, it is able of achieving a high throughput of modular exponentiations. As a result, this IP-Core provides a good compromise between processing time and resources compared to general purpose processors.
Other features of the IPX-RSA core are self-support and ease of use. The IP-Core needs no interaction with the main processor during computation and requires no pre/post computation of the base and exponent (A and e). It is also accessed through a simple 32-bit processor bus.
查看 RSA Public Key Cryptography Exponentiation Accelerator 详细介绍:
- 查看 RSA Public Key Cryptography Exponentiation Accelerator 完整数据手册
- 联系 RSA Public Key Cryptography Exponentiation Accelerator 供应商
RSA IP
- Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Secure-IC's Securyzr™ Tunable Public Key Cryptographic (RSA, ECDSA, SM2, Diffie-Hellman) accelerator - optional SCA protection
- Java Card compliant cryptographic library for encryption and decryption of RSA, DSA, Diffie-Hellman, El-Gamal and Elliptic Curves algorithms
- Hardware accelerator for RSA, DSA, Diffie-Hellman, El-Gamal and Elliptic Curves algorithms
- Secure cryptographic library compliant with the X9.31 and FIPS 186-4 standards.
- Secure key computation, encryption, decryption, signature and verification functionalities compliant with the PKCS#1