DCRP1A
CryptOne IP System
The DCRP1A - CryptOne IP is a 100% secure cryptographic system
Description
CryptOne – a 100% secure cryptographic system based on more than 20 years of DCD’s market experience. It is a universal and fully scalable solution that is able to boost asymmetric cryptographic algorithms like:
- Digital Signature,
- modular exponentiation (RSA)
- RSA (keys up 4096 bits) with CRT option
- Diffie-Hellman
- Elliptic Curve Cryptography (ECC) in GF(p)
- Miller-Rabin test
DCD’s cryptographic solutions offer various configurations, tailored to the project needs. During the tests, the DCRP1’s utilized up to 25% fewer logic cells, with the same performance – when compared to competitive designs. And when it’s optimized for speed, it’s achieved up to 50% higher performance, than competitive designs.
What does that mean? Ultimate performance:
Elliptic Curve NIST-P256 operations performance at 200 MHz
EC point mul: 2.5 ms
ECDSA sign: 2.6 ms
ECDSA verify: 3.2 ms
The energy-efficient architecture of CryptOne IP core enables the usage of a very small silicon footprint with high processing speeds. It can be provided with various different interfaces, including AMBA AHB, AXI4, and APB. The very intuitive interface allows fast and straightforward system integration. The core is resistant to timing attacks and contains optional DPA countermeasures. CryptOne system is universal and fully scalable, accelerating up to 4096 bits big number arithmetic operations such as: modular multiplication, subtraction, addition, and shifts. Cryptographic instructions support provides the ability to boost public key algorithms like RSA, Diffie-Hellman, and ECC.
DESIGN FEATURES:
ALL DCD’S IP CORES ARE TECHNOLOGY INDEPENDENT WHICH MEANS THAT THEY ARE 100% COMPATIBLE WITH ALL FPGA & ASIC VENDORS E.G.
- Altera / Intel,
- Xilinx / AMD,
- Lattice,
- Microsemi / Microchip,
and others. - TSMC
- UMC
- SK Hynix
and others.
Key features
- CryptOne constant time algorithms:
- Modular exponentiation,
- Parallel modular exponentiation CRT
- ECDSA sign/verify
- ECDH
- Elliptic curve point multiplication
- Modular multiplicative inverse
- GCD
- Modular reduction
- Multiplication
- Division
- Cryptographic algorithm applications:
- ECDSA, ECDH
- RSA key generation
- RSA Sign/Verify/Encrypt/Decrypt
- Diffie-Hellman schemes
- Miller-Rabin Primality check
- System applications:
- Client-server communication
- Sensor networks
- SSL/TLS stacks
- IoT devices
- Embedded security/ID devices
- AMBA AHB, AXI4, APB interface ready
- Rapid & easy development with delivered API
- Patent pending architecture
- Algorithms resistant against SPA and timing attacks
- CryptOne elliptic curves with native support:
- NIST P-192
- NIST P-224
- NIST P-256
- NIST P-384
- Koblitz P-192
- Koblitz P-256
- Koblitz P-384
- Brainpool P-256
- Brainpool P-384
- Brainpool P-512
- Other/custom curves optional support
- Software support:
- OpenSSL engine
- MbedTLS port
- OS independent crypto library
Similar products
Thanks to its increased code density, the D32PRO meets the power and size requirements of new connected devices. That’s why...
royalty-free & silicon proven
performance up to 1.52/2.67 DMIPS/MHz
even 10.6k/6.8k ASIC gates
The DQ80251 is a revolutionary Quad-Pipelined ultra high performance, speed optimized soft core of a 16-bit/32-bit embedded microcontroller. The core is fully...
World's Fastest 8051 & 80251 CPU
75 times faster than the original 80C51
up to 75.08 VAX MIPS ratio
The I3C (Improved Inter-Integrated Circuit) is the successor of the I2C bus. Keeping the best assets from its elder...
MIPI I3C specifications with Host Controller Interface (HCI) v1.1 specification
Master transmitter
Master receiver