ECDSA signature verification engine
In addition to its support for various elliptic curves, CryptOne’s prowess extends to the widely acclaimed Elliptic Curve Digital…
Overview
In addition to its support for various elliptic curves, CryptOne’s prowess extends to the widely acclaimed Elliptic Curve Digital Signature Algorithm (ECDSA). ECDSA, based on the principles of elliptic curve cryptography, is a cornerstone of modern cryptographic systems and provides a secure and efficient method for digital signature generation and verification.
CryptOne’s implementation of ECDSA leverages the inherent mathematical properties of elliptic curves to ensure the integrity, authenticity, and non-repudiation of digital data. The algorithm operates by generating a digital signature using the private key associated with an elliptic curve key pair. This signature can then be verified by employing the corresponding public key, thus establishing the authenticity and integrity of the signed data.
Underpinning CryptOne’s ECDSA operations is a suite of robust and optimized algorithms and protocols. These algorithms efficiently perform the necessary mathematical computations involving elliptic curves, resulting in swift and accurate digital signature generation and verification processes. By adhering to the FIPS 186 standard, CryptOne’s ECDSA implementation meets stringent security requirements, ensuring compatibility and interoperability with a wide range of cryptographic systems.
Furthermore, CryptOne’s IP core architecture plays a crucial role in optimizing ECDSA performance. Its scalable design allows for the efficient execution of ECDSA operations, enabling high-speed processing while maintaining a minimal silicon footprint. This unique combination of scalability and performance empowers CryptOne to deliver exceptional cryptographic performance, making it an ideal solution for resource-constrained environments where computational efficiency is paramount.
With CryptOne’s advanced ECDSA capabilities, organizations can confidently secure their digital communications, transactions, and sensitive data by leveraging the robustness and efficiency of elliptic curve cryptography. By integrating CryptOne into their cryptographic infrastructure, users can harness the power of ECDSA to ensure the utmost security and trustworthiness of their digital interactions.
Key features
- Supported Elliptic Curves
- NIST SECP P-256 R1
- NIST SECP P-384 R1
- Koblitz SECP P-256 K1
- Koblitz SECP P-384 K1
- Brainpool P-256 R1
- Brainpool P-384 R1
- Brainpool P-512 R1
- other/custom curves optional support
- Optional Side Channel Attacks countermeasures
- Input/Output EC point verification
- Fully synthesizable, synchronous design
- Highly configurable in terms of performance and resource consumption
- Minimum operation delay at 200 MHz:
- Point multiplication:
- EC256: 2.5 ms
- EC384: 5.0 ms
- ECDSA signature generation
- EC256: 2.6 ms
- EC384: 5.2 ms
- ECDSA signature verification
- EC256: 3.1 ms
- EC384: 6.3 ms
- Estimated resource usage
- from 30k to 110k NAND gates
- Point multiplication:
Applications
- Digital signature
- Data integrity
- Key derivation
- TLS/SSH/PGP IPsec communication
What’s Included?
- HDL Source Code
- Testbench environment
- Automatic Simulation macros
- Tests with reference responses
- Synthesis scripts
- Technical documentation
- 12 months of technical support
Files
Note: some files may require an NDA depending on provider policy.
Specifications
Identity
Provider
Learn more about Public Key IP core
Securing the IoT: Part 1 - Public key cryptography
Smart Engine for Public Key cryptography
Public key cryptography and security certificates
Securing your apps with Public Key Cryptography & Digital Signature
Formally verifying AVX2 rejection sampling for ML-KEM
Frequently asked questions about Public-Key Cryptography IP cores
What is ECDSA signature verification engine?
ECDSA signature verification engine is a Public Key IP core from Digital Core Design listed on Semi IP Hub.
How should engineers evaluate this Public Key?
Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.
Can this semiconductor IP be compared with similar products?
Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.