Smart Engine for Public Key cryptography
Sébastien Rabou, Denis Galerin, Thierry Pauwels
Barco Silex
The need for security in embedded application is continuously rising. And Public Key cryptography is one of the most common ways to secure data communication. But Public Key processing requires very large computation capability.
Processors are commonly used to perform very complex operations. However, the heavy processing load generated by Public Key cannot be addressed by CPUs without significantly degrading system performances.
Of course, we can use hardware accelerators. But, pure RTL blocks are not flexible enough to support the various Public Key algorithms (ECC, RSA, ECDSA, …). Moreover, data transfers must still be controlled by the main processor.
Smart Engine provides the optimal combination of hardware and software (micro-code). This kind of architecture provides the best of both worlds: the efficiency of hardware and the flexibility of software.
Furthermore, the Smart Engine can be scalable. It will always provide an optimal balance between gate-count, performance, functionality and power. And by supporting standard interfaces, the Smart Engine is really easy to integrate in complex system.
This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as we have implemented it in the BA414E Public Key Crypto Engine.
Related Semiconductor IP
- USB 4.0 V2 PHY - 4TX/2RX, TSMC N3P , North/South Poly Orientation
- FH-OFDM Modem
- NFC wireless interface supporting ISO14443 A and B with EEPROM on SMIC 180nm
- PQC CRYSTALS core for accelerating NIST FIPS 202 FIPS 203 and FIPS 204
- USB Full Speed Transceiver
Related White Papers
- Securing your apps with Public Key Cryptography & Digital Signature
- Public key cryptography and security certificates
- Securing the IoT: Part 1 - Public key cryptography
- ECC Holds Key to Next-Gen Cryptography
Latest White Papers
- FastPath: A Hybrid Approach for Efficient Hardware Security Verification
- Automotive IP-Cores: Evolution and Future Perspectives
- TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs
- How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems
- SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models