Vendor: IP Cores, Inc. Category: Public Key

Scalable RSA and Elliptic Curve Accelerator

Rivest-Shamir-Adelman (RSA) is a public-key cryptographic technology that uses the mathematics of so called “finite field exponen…

Overview

Rivest-Shamir-Adelman (RSA) is a public-key cryptographic technology that uses the mathematics of so called “finite field exponentiation”. The operations necessary for the RSA cannot be efficiently implemented on an embedded CPU, typically requiring many seconds of the CPU time for signature verification. RSA5X implements by far the most time-consuming operation of the RSA cryptography: so called “exponentiation” to enable low-power operation high-speed operation.

RSA5X-4096-32-3 is targeted toward mid performance applications (hundreds of RSA operations per second at typical clock rates).

RSA5X also supports finite programmable field arithmetic for both prime (GF(p)) and, optionally, binary (GF(2m)) Galois fields of sizes from 96 bits to 576 bits to support the elliptic curve cryptography (ECC) calculations.

The design is fully synchronous and uses microprocessor-friendly interface.

Function Description

The core implements the exponentiation operation of the RSA cryptography Q = Pk. The operands for the exponentiation: k and P as well as the modulus are programmed into the memory and the calculation is started. Once the operation is complete, the result Q can be read through the interface.

Elliptic curve support via microprograms stored in the internal memory. SDK provides microprograms for the popular curve types, including all NIST and SECP curves.

Key features

  • Small size: RSA5X starts from less than 100K ASIC gates (size depends on the core configuration)
  • Implements a modular RSA exponentiation engine; CPU assistance is only required for programming parameters and reading the results. Implements a microprogram-driven interface for the finite field arithmetic. Microprograms consist of three-address operations, are stored in the external memory, and can be invoked by the CPU. CPU assistance is only required for writing the microprograms into memory programming parameters and reading the results.
  • 32 bit-wide microprocessor-friendly register-based interface. done output can be connected to the interrupt pin of the CPU.
  • Self-contained, except for the external single-port memory
  • Test bench provided

Block Diagram

Applications

  • Secure communications systems
  • Digital Rights Management (DRM) for battery powered electronics
  • Digital Signature using Reversible Public Key (rDSA) standard ANSI X9.31
  • Digital Signature Standard (DSS) FIPS-186
  • PKCS RSA cryptography per RFC 2347
  • High performance RSA accelerators
  • Elliptic curve cryptography per FIPS 186-3, NIST SP800-56A, SEC 1 and SEC 2 standards

What’s Included?

  • Synthesizable Verilog RTL source code
  • Software SDK for complete RSA, CRT, DH, ECDH, DSA, and ECDSA implementation
  • Verilog testbench (self-checking)
  • Test harness and simulator for software modules
  • Vectors for testbench and test harness
  • Expected results
  • User Documentation

Specifications

Identity

Part Number
RSA5X
Vendor
IP Cores, Inc.
Type
Silicon IP

Security

Crypto Algorithm
RSA

Files

Note: some files may require an NDA depending on provider policy.

Provider

IP Cores, Inc.
HQ: USA
IP Cores, Inc specializes on IP cores for semiconductors, primarily in the security and cryptography area with a sprinkle of DSP. Whether your needs are in 802.16e, P1619, 802.1AE, content protection, or FFT, our cryptographic and DSP cores usually are the smallest, fastest, and lowest-cost choices on the market.

Learn more about Public Key IP core

Smart Engine for Public Key cryptography

This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine

Formally verifying AVX2 rejection sampling for ML-KEM

Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)

Frequently asked questions about Public-Key Cryptography IP cores

What is Scalable RSA and Elliptic Curve Accelerator?

Scalable RSA and Elliptic Curve Accelerator is a Public Key IP core from IP Cores, Inc. listed on Semi IP Hub.

How should engineers evaluate this Public Key?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP