Network Security Crypto Accelerator

Overview

To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain dedicated hardware accelerators that offload challenging tasks, such as network protocol computation, AI and deep learning, and – most importantly – security. For a security performance that matches the speed of the new SoCs we are offering a scalable hardware IP block that handles encryption at speeds from a few Gbps to over 100Gbps, depending on the needs.


The Network Security Crypto Accelerator is used to accelerate/offload MACsec, IPsec, VPN, TLS/SSL, disk encryption, or any other custom application, requiring symmetric cryptography algorithms. It can also be combined with the eSecure Root of Trust module to form a complete secure enclave, that will handle the keys without exposing them to the software, which makes it suited for even the most regulated and security-sensitive industries.

Direct Memory Access (DMA)
Native speeds of hardware cores may remain largely theoretical if the host processor is not able to deliver data to the crypto module and process the results at the same speed. That is why this Network Security Crypto Accelerator includes a Direct Memory Access (DMA) interface to the host memory space. Here, the operations are efficiently offloaded via a built-in scatter-gather DMA optimized to handle networks packets of any size.

The platform integrates your desired selection of our cryptographic IP cores, a DMA and software layers providing a complete solution.

Key Features

  • Scalable architecture & crypto engines for optimal performance/resource usage
  • Configurable for perfect application fit
  • 100% CPU offload with low latency and high throughput
  • Optional DPA countermeasures for AES and SM4
  • Full software/driver support - Linux drivers (Crypto API integration)
  • Easy integration - AXI interface
  • Low power
  • Can use keys (from eSecure or others) hidden from CPU

Benefits

  • Offload the compute intensive Public Key operations (Diffie-Helmann, Signature Generation and Verification)

Block Diagram

Network Security Crypto Accelerator Block Diagram

Applications

  • Secure Communication (TLS, MACsec, IPSec, ...)
  • Secure Storage

Deliverables

  • Netlist or RTL
  • SW drivers (Linux)
  • Scripts for implementations
  • Self-checking RTL test-bench based on referenced vectors
  • Documentation

Technical Specifications

Availability
Now
×
Semiconductor IP