Vendor: IP Cores, Inc. Category: Public Key

Elliptic Curve Point Multiply and Verify Core

Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curve…

Overview

Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curves” and it is a part of the “Suite B” of cryptographic algorithms approved by the NSA.

Since ECC requires fewer bits than RSA to achieve the same cipher strength, it is frequently used in embedded applications. The operations necessary for the ECC cannot be efficiently implemented on an embedded CPU, however, typically requiring hundreds of milliseconds of the CPU time for signature verification.

ECC1 implements by far the most time-consuming operation of the ECC cryptography: so called “point multiplication” to enable low-power operation of the battery-powered devices. It also supports the “point verification” operation to simplify the system integration.

The design is fully synchronous and available in multiple configurations varying in bus widths, set of elliptic curves supported and throughput.

Key features

  • ECC1 implementation is unencumbered by any patents
  • Small size: ECC1 requires less than 10K ASIC gates
  • High throughput for long life battery powered applications: 5,000 point multiplications per second in the 65 nm ASIC process
  • Support for the NIST ECC binary fields 2163, 2233, 2283, 2409, and 2571
  • Microprocessor-friendly interface
  • Test bench provided

Benefits

  • Smallest core on the market, patent-free implementation

What’s Included?

  • Synthesizable Verilog RTL source code
  • Software modules for a complete ECC implementation (optional)
  • Verilog testbench (self-checking)
  • Vectors for the testbench
  • Expected results
  • User Documentation

Specifications

Identity

Part Number
ECC
Vendor
IP Cores, Inc.
Type
Silicon IP

Files

Note: some files may require an NDA depending on provider policy.

Provider

IP Cores, Inc.
HQ: USA
IP Cores, Inc specializes on IP cores for semiconductors, primarily in the security and cryptography area with a sprinkle of DSP. Whether your needs are in 802.16e, P1619, 802.1AE, content protection, or FFT, our cryptographic and DSP cores usually are the smallest, fastest, and lowest-cost choices on the market.

Learn more about Public Key IP core

Smart Engine for Public Key cryptography

This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine

Formally verifying AVX2 rejection sampling for ML-KEM

Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)

Frequently asked questions about Public-Key Cryptography IP cores

What is Elliptic Curve Point Multiply and Verify Core?

Elliptic Curve Point Multiply and Verify Core is a Public Key IP core from IP Cores, Inc. listed on Semi IP Hub.

How should engineers evaluate this Public Key?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP