Is this your business? Claim it to manage your IP and profile
The AES IP Core offers an ultra-compact implementation of the Advanced Encryption Standard, known for its compliance with the NIST standard. Designed to run efficiently on both ASICs and FPGAs, it processes 128-bit data blocks using 128-bit or 256-bit keys, ensuring high security. The core is designed to perform encryption in several cipher modes such as ECB, CFB, CBC, OFB, and CTR, making it versatile for different applications. Delivering top-tier performance with a minimal footprint, it provides excellent throughput and supports crucial features like key expansion, all without requiring external memory. This core is validated by FIPS-197 and offers a robust solution for secure communications and data protection.
The AES Key Wrap Core facilitates secure cryptographic key management through the wrapping and unwrapping processes adhering to NIST specifications. This core is designed to provide comprehensive encryption capabilities using both 128-bit and 256-bit Key Encryption Keys. Distinguished by its flow-through architecture, the implementation allows for efficient key management without external memory dependencies, making it optimal for secure data transmission applications. Its compact design, starting from less than 8,000 ASIC gates, delivers high-speed and secure key operations, positioning it as a trusted component in systems prioritizing security.
The DES/3DES core is a pinnacle of compact design, implementing both DES and Triple DES encryption as outlined by the NIST Data Encryption Standard. It supports 64-bit block sizes with key lengths of 56 bits, extendable to triple keys for added security. Known for its minimal gate count, the core integrates seamlessly into systems that require robust cryptographic functions while maintaining a small silicon footprint. It is highly parameterizable for a range of cipher modes like ECB, CBC, OFB, CFB, and CTR, providing flexibility for integration into diverse systems. Offering remarkable speeds, this core is ideal for applications requiring secure mobile communications and financial transactions.
The SNOW 3G Encryption Core is aligned with the ETSI SAGE specification, executing keystream generation for use in 3GPP LTE mobile communication algorithms. Compact in design yet robust in its operation, it is built to deliver high throughput for secure mobile phone communications. Its layout adheres to a synchronous model, accommodating implementation across various platforms efficiently. As an essential tool for the UMTS algorithms, this core assures compatibility and performance in secure mobile network communications, offering a dependable foundation for implementing LTE secure algorithms like UEA2 and UIA2.
This True Random Number Generator core offers a seamless solution for generating true random numbers in compliance with stringent NIST and Diehard Random Test requirements. With applications across ASICs and FPGAs, this core combines an internal entropy source with robust randomness tests to deliver outputs suitable for high-security applications. The TRNG1 core excels in scenarios demanding genuine randomness for encryptionkeys, secure communications, and more. Its compact and efficient design ensure minimal power usage while maintaining high throughput, making it indispensable for environments that require unfailing security assured by true random data.
The Cryptographically Secure Pseudo Random Number Generator (PRNG) core supplies secure pseudo-random numbers vital for cryptographic applications. Adhering to the NIST SP800-90 standard, the PRNG1 core is tailored to generate high-security random data blocks. This core leverages a CTR_DRBG algorithm to produce cryptographic-grade pseudo-random sequences effectively, suitable for a wide scope of secure communications and data protection tasks. Its architecture supports high parameterization, allowing integration into multiple sizes and systems, especially where hardware-based entropy sources are required. Its small size and efficiency make it an appealing choice for secure systems relying on cryptographically sound random numbers.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.