Vendor: TES Electronic Solutions Category: Public Key

ECDSA (Elliptic Curve Digital Signature) IP Core

The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve.

Overview

The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve.

This cutting-edge ECDSA IP provides superior security by ensuring execution time remains independent of the secret value, thereby mitigating timing-based side channel attacks.

With its internal data memory block interface, the ECDSA IP simplifies programming and execution, making it the ideal solution for your cryptographic needs.

Function

Main Building Blocks:

  • Input Data Memory Interface
  • Output Data Register Bank
  • Program and Constant ROMs
  • CoProcessor (with the Register Banks)

Experience seamless data exchange with our advanced ECDSA IP.

By reading from external memory and writing results to a dual output register bank, our ECDSA IP efficiently performs ECC computations based on the hardwired program in the program ROM.

This ensures optimal performance and reliability for your cryptographic needs.

Functions available

  • gfp_keygen
  • gfp_sign_genius
  • pkeyutl
  • dgst_sha256_sign

Performance

ECDSA IP

 

XILINX ARTIC7

xFab 180nm

GFP_KEYGEN

~ 18 msec @ Fmax up to 40MHz ~ 88 msec @ Fmax up to 8MHz

GFP_SIGN_GENIUS

~17.7 msec @ Fmax up to 40MHz ~ 88.5 msec @ Fmax up to 8MHz

Testing

The TES ECDSA IP Core has successfully completed the Known Answer Test and Monte Carlo Tests as specified by NIST. These tests were conducted in ModelSim© and IKOS© Mode.

Additionally, eVerification© Tests against the Python Algorithm RTL Equivalence and the executable OpenSSL specification were performed at speed and across multiple instances.

The TES ECDSA IP Core passed all Tests, demonstrating its reliability and performance.

Key features

  • Full ECDSA implementation adhering to Standards for Efficient Cryptography (SEC)
  • Bitcoin algorithm support
  • Technology-independent HDL model
  • Simple external interface for easy adaptation
  • Structured core design
    • Optimized for minimal area, low power consumption, and reduced computation time

Benefits

  • Software-defined 256-bit implementation
  • Customizable ECDSA-specific user functions
  • User requirements easily implemented through microcoding

Applications

The NIS 2 Directive is crucial EU legislation designed to help enhance cybersecurity for operational technology (OT) systems in critical infrastructure, setting new standards across EU member states and promoting proactive measures to help improve business continuity and resilience against evolving cyber threats.

Examples:

  • Industrial control
  • Smart Home Applications
  • IoT devices
  • Protected Communication

What’s Included?

  • User-Documentation
  • Encrypted VHDL RTL code

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
ECDSA (Elliptic Curve Digital Signature)
Vendor
TES Electronic Solutions

Provider

TES Electronic Solutions
HQ: Germany
TES Electronic Solutions is a global electronic technology and services company offering innovative solutions and custom electronic design as well as a blend of hardware (for ASICs and FPGAs) and software IP. Besides designing customer specific systems or sub-systems that are optimized to customers’ applications, TES also develops licensable wireless, graphics,GUI, video-IO and multimedia IP accelerating time to market. From its design centers in Germany, and with its broad expertise in GUI concepts, industrial design, hardware-, software-, FPGA- and ASIC-development TES provides innovative solutions in the areas of RF / wireless, professional multimedia, embedded graphics and RF / mixed-signal ASICs. TES serves a wide range of customers from well-known highly specialized middle-size companies to global market leaders.

Learn more about Public Key IP core

Smart Engine for Public Key cryptography

This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine

Formally verifying AVX2 rejection sampling for ML-KEM

Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)

Frequently asked questions about Public-Key Cryptography IP cores

What is ECDSA (Elliptic Curve Digital Signature) IP Core?

ECDSA (Elliptic Curve Digital Signature) IP Core is a Public Key IP core from TES Electronic Solutions listed on Semi IP Hub.

How should engineers evaluate this Public Key?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP