Vendor: Digital Core Design Category: Public Key

ECDSA sign engine

When safety & security meet the best size/performance ratio… ECDSA IP Core Elliptic curves form the foundation of cutting-edge pu…

Overview

When safety & security meet the best size/performance ratio… ECDSA IP Core

Elliptic curves form the foundation of cutting-edge public-key cryptography, serving as a crucial component for secure digital signatures and robust key agreement protocols, such as the esteemed Diffie-Hellman scheme. Leveraging the mathematical properties of elliptic curves, CryptOne emerges as a formidable IP Core specifically engineered to execute elliptic curve cryptography operations with unparalleled efficiency and reliability.

Adhering to the rigorous guidelines set forth by the Federal Information Processing Standards (FIPS) 186 standard, our CryptOne solution not only meets but exceeds the stringent security requirements demanded by modern electronics. By supporting a diverse array of elliptic curves, CryptOne empowers users with the flexibility to select curves that align with their specific cryptographic needs, ensuring compatibility with a wide range of cryptographic systems.

What sets CryptOne apart is its ingenious design and remarkable scalability achieved through the utilization of DCD’s exceptional IP core architecture. This groundbreaking architecture enables the implementation of CryptOne with an incredibly compact silicon footprint, maximizing resource utilization while minimizing overhead costs. Furthermore, CryptOne’s superior processing speeds deliver lightning-fast cryptographic operations, enabling rapid and seamless integration within high-performance computing environments.

With CryptOne’s innovative IP core at the heart of your cryptographic infrastructure, you can harness the power of elliptic curves with unmatched efficiency, reliability, and compliance, ushering in a new era of secure communications and data protection.

Key features

  • Supported Elliptic Curves
    • NIST SECP P-256 R1
    • NIST SECP P-384 R1
    • Koblitz SECP P-256 K1
    • Koblitz SECP P-384 K1
    • Brainpool P-256 R1
    • Brainpool P-384 R1
    • Brainpool P-512 R1
    • other/custom curves optional support
  • Optional Side Channel Attacks countermeasures
  • Input/Output EC point verification
  • Fully synthesizable, synchronous design
  • Highly configurable in terms of performance and resource consumption
  • Minimum operation delay at 200 MHz:
    • Point multiplication:
      • EC256: 2.5 ms
      • EC384: 5.0 ms
    • ECDSA signature generation
      • EC256: 2.6 ms
      • EC384: 5.2 ms
    • ECDSA signature verification
      • EC256: 3.1 ms
      • EC384: 6.3 ms
    • Estimated resource usage
      • from 30k to 110k NAND gates

What’s Included?

  • HDL Source Code
  • Testbench environment
    • Automatic Simulation macros
    • Tests with reference responses
  • Synthesis scripts
  • Technical documentation
  • 12 months of technical support

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
ECDSA sign 256
Vendor
Digital Core Design

Provider

Digital Core Design
HQ: Poland
Founded in 1999, Digital Core Design is a global leader in IP core development, specializing in microprocessor, microcontroller, and communication solutions. With a portfolio of over 100 IP cores, DCD continues to drive innovation in embedded systems, providing cutting-edge solutions for automotive, industrial, IoT, and security applications.

Learn more about Public Key IP core

Smart Engine for Public Key cryptography

This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine

Formally verifying AVX2 rejection sampling for ML-KEM

Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)

Frequently asked questions about Public-Key Cryptography IP cores

What is ECDSA sign engine?

ECDSA sign engine is a Public Key IP core from Digital Core Design listed on Semi IP Hub.

How should engineers evaluate this Public Key?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP