All IPs > Security IP > Cryptography Software Library
In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.
Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.
The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.
At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.
The RV12 is a flexible RISC-V CPU designed for embedded applications. It stands as a single-core processor, compatible with RV32I and RV64I architectures, offering a configurable solution that adheres to the industry-standard RISC-V instruction set. The processor's Harvard architecture supports concurrent instruction and data memory accesses, optimizing its operation for a wide array of embedded tasks.
PUFrt serves as a foundational hardware root of trust, featuring advanced key generation and storage capabilities inherent to the chip. It integrates a true random number generator (TRNG) and hardcore anti-tamper protections. With a built-in secure OTP, PUFrt provides unrivaled security for sensitive data, ensuring encryption and decryption processes are secured at the hardware level. This IP is adept at securing the semiconductor supply chain, countering the risks of reverse engineering and ensuring device authenticity through its robust identification systems. PUFrt features extensive customization options and interfaces for integration across diverse architectures, aiming to minimize user effort in embedding security functions within complex systems.
Efinix's Topaz FPGA series is engineered for mass-market applications, delivering a perfect mix of efficiency and adaptability. These FPGAs encapsulate a highly efficient architecture, combined with the industry's essential features and protocols, such as PCIe Gen3, MIPI, and LPDDR4. This configuration allows users to harness substantial performance while maintaining ample room for future innovations. Topaz FPGAs are optimized for high-volume production environments where cost-effectiveness and swift integration are paramount. Their design promotes ease of implementation in various applications, spanning from automotive to deeply embedded systems, where reliability and robustness are key. Featuring a streamlined architecture, Topaz series FPGAs support modern connectivity standards and data processing capabilities. These devices are tailored for industries requiring scalable solutions that can adapt to evolving technological landscapes, ensuring that Efinix customers remain competitive in their respective fields.
Post-quantum cryptography library for memory-constrained platforms PQCryptoLib-Embedded is a version of PQCryptoLib, PQShield’s library of post-quantum cryptographic algorithms, which is designed for microcontrollers or memory-constrained platforms. The library is highly configurable at build time, which means binary size and memory footprint can be minimized, making this product ideal for constrained devices. Efficiency is important in implementing ML-DSA and ML-KEM, especially for devices or networks requiring quantum-safe TLS communication such as in IoT environment. As a standard software library, PQCryptoLib-Embedded is a versatile tool for developing post-quantum protocols in memory-constrained situations.
Post-Quantum Software Library General purpose FIPS 140-3 certified cryptographic library for a wide variety of applications. PQCryptoLib is designed to provide the latest standardized post-quantum and classical algorithms in a software environment. With a configurable, secure and easy to use API, it’s optimized for crypto-agility, particularly when it comes to FIPS compliant hybrid solutions and protecting against harvest-now-decrypt-later attacks. The goal of PQCryptoLib is to help organizations transition to quantum resistance in a manageable, easy-to-integrate solution.
The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.
The Alcora V-by-One HS FMC daughter card by Parretto facilitates the integration of V-by-One HS interfaces into FPGA systems with ease. It provides 8 RX and 8 TX lanes, allowing for a total of 16 lanes when two cards are used, capable of supporting 4K resolutions at 120Hz, or 8K at 30Hz. Designed for versatility, Alcora comes in two configurations: 51-pin and 41-pin headers. Built for stability, it includes two clock generators to synthesize the transceiver reference clock and reduce jitter, optimizing digital video transmission over the high-speed interface. V-by-One HS technology, developed by THine Electronics, Inc., positions the Alcora card as a prime component for high-resolution video and flat panel display markets, bridging the gap between superior video outputs and a variety of digital displays.
AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.
The ATEK250P3 is a state-of-the-art absorptive SPDT switch designed for communication and sensor applications up to 14 GHz. This switch excels in providing minimal insertion loss of 1.5 dB while ensuring excellent isolation of 43 dB. With an IP1dB of 27 dBm and an IIP3 of 44 dBm, it is well-suited for high-performance environments requiring reliable control voltage, offered in a compact 3x3 QFN package.
The DK8x02 Evaluation Kit (EVK) is an essential tool for battery developers and BMS designers to explore the capabilities of the Dukosi Cell Monitoring System. Within minutes, users can set up a cell network using the intuitive software environment provided. The kit includes numerous components necessary for developing and testing next-generation battery solutions, offering comprehensive support and documentation for seamless integration.
The Quantum Resistant Encryption Core is designed to offer robust security against emerging quantum threats. It features algorithms curated to withstand quantum computing capabilities, thus ensuring that sensitive information remains safeguarded. The solution forms an integral part of Crypto Quantique’s security architecture, leveraging their deep understanding of cryptographic principles to fortify device security. This core employs high-level encryption standards and is developed to support rapid integration into existing digital infrastructures. One of its standout features is its adaptability, meaning it can be implemented across a range of devices and platforms with minimal disruption. This versatility is crucial given the diverse nature of devices within the IoT ecosphere. Moreover, the Quantum Resistant Encryption Core is engineered with performance in mind, efficiently managing resources to ensure that security does not come at the expense of processing speed or energy consumption. Incredible resilience against future threats is provided by the integration of post-quantum cryptographic standards. Traditional cryptographic methods face significant risks as quantum computing technology becomes more prevalent, making quantum-resistant solutions imperative for long-term security strategy. This core solution by Crypto Quantique thus ensures devices remain protected well into the future, maintaining the integrity and confidentiality of data.
Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments
Helion's SHA hashing cores offer powerful solutions for secure data verification needs, featuring implementation of widely recognized hash functions such as SHA-1 and the SHA-2 family, which includes SHA-224, SHA-256, SHA-384, and SHA-512. These one-way cryptographic functions generate fixed-length message digests for data verification, ensuring data integrity and authentication in digital signatures, security protocols like IPsec, and TLS/SSL. These cores are built to cater to different processing demands, providing both high-performance and resource-efficient options. For applications that require rapid processing with minimal area impact, Helion's FAST hashing core family achieves data rates up to 4Gbps. Alternatively, their TINY hashing core family is designed to handle low power and data rate applications, making it suitable for less demanding environments with space constraints. Helion's SHA hashing solutions are versatile, supporting various platforms including Xilinx, Altera, and Microsemi FPGAs, as well as ASIC implementations. Their efficient architecture ensures ease of integration without compromising on performance, catering to a range of applications from simple data integrity checks to complex cryptographic procedures.
The Securyzr Key Management System offers a comprehensive environment for managing authentication keys, ensuring their secure distribution and maintenance. This system is engineered to protect data integrity and privacy in widespread IoT networks. By incorporating features like secure key bootstrapping and updates, the system ensures robust protection against unauthorized access and misuse of secure keys, making it ideal for deployments that demand high levels of trust and secrecy.
This thermal noise-based random bit generator leverages the inherent unpredictability of thermal noise to create truly random sequences of bits, vital for security protocols and cryptographic applications. Operating within a frequency range of 0.2 to 2 MHz, the generator is engineered for efficient power use with a quiescent current draw of around 50 uA. The compact design and reliable output make it suitable for applications where secure random bit generation is a necessity, such as in secure communications and data encryption systems.
ATEK350N4 stands out as an analog variable voltage attenuator optimized for 2 to 40 GHz frequencies. Providing a low insertion loss of 1.9 dB, it features a substantial attenuation range of 27 dB. Known for its robust IP1dB of 22 dBm and intermodulation performance of IIP3 at 32 dBm, this VVA enhances signal control in dynamic environments, packaged in a 4x4 QFN form factor.
The nRF54L15 System-on-Chip (SoC) is a sophisticated and ultra-low-power wireless solution designed to accommodate a wide array of applications. It combines 1.5 MB of Non-Volatile Memory (NVM) and 256 KB of RAM to support extensive protocol stacks like Bluetooth LE, Thread, and Zigbee. The nRF54L15 also embraces proprietary 2.4 GHz protocols, providing developers with broad versatility in their projects. This SoC utilizes a suite of advanced power management features to ensure energy efficiency, essential for battery-powered applications. The nRF54L15 is compatible with a range of Nordic's development tools, offering a full-fledged ecosystem to streamline the development process and innovate within the IoT domain.
The Suite-Q SW is a versatile cryptographic software library designed for optimized performance across a wide range of platforms. It is highly customizable to manage code size, stack usage, and processing capabilities, available in both C and hand-optimized assembly suitable for multiple processor architectures. This makes Suite-Q SW ideal for integrating cryptographic capabilities without excessive resource use, especially on memory-limited devices. The software library allows for seamless operation on general-purpose and embedded CPUs, offering various configurations to balance speed and memory requirements effectively. With a focus on flexibility, it provides simple plug-in modules and capabilities for hardware offloading where needed. The Suite-Q SW caters to a broad spectrum of cryptographic needs, backed by comprehensive validation tests and performance metrics, ensuring it meets industry standards and operational excellence.