Vendor: Digital Core Design Category: Public Key

ECDSA signature verification engine

In addition to its support for various elliptic curves, CryptOne’s prowess extends to the widely acclaimed Elliptic Curve Digital…

Overview

In addition to its support for various elliptic curves, CryptOne’s prowess extends to the widely acclaimed Elliptic Curve Digital Signature Algorithm (ECDSA). ECDSA, based on the principles of elliptic curve cryptography, is a cornerstone of modern cryptographic systems and provides a secure and efficient method for digital signature generation and verification.

CryptOne’s implementation of ECDSA leverages the inherent mathematical properties of elliptic curves to ensure the integrity, authenticity, and non-repudiation of digital data. The algorithm operates by generating a digital signature using the private key associated with an elliptic curve key pair. This signature can then be verified by employing the corresponding public key, thus establishing the authenticity and integrity of the signed data.

Underpinning CryptOne’s ECDSA operations is a suite of robust and optimized algorithms and protocols. These algorithms efficiently perform the necessary mathematical computations involving elliptic curves, resulting in swift and accurate digital signature generation and verification processes. By adhering to the FIPS 186 standard, CryptOne’s ECDSA implementation meets stringent security requirements, ensuring compatibility and interoperability with a wide range of cryptographic systems.

Furthermore, CryptOne’s IP core architecture plays a crucial role in optimizing ECDSA performance. Its scalable design allows for the efficient execution of ECDSA operations, enabling high-speed processing while maintaining a minimal silicon footprint. This unique combination of scalability and performance empowers CryptOne to deliver exceptional cryptographic performance, making it an ideal solution for resource-constrained environments where computational efficiency is paramount.

With CryptOne’s advanced ECDSA capabilities, organizations can confidently secure their digital communications, transactions, and sensitive data by leveraging the robustness and efficiency of elliptic curve cryptography. By integrating CryptOne into their cryptographic infrastructure, users can harness the power of ECDSA to ensure the utmost security and trustworthiness of their digital interactions.

Key features

  • Supported Elliptic Curves
    • NIST SECP P-256 R1
    • NIST SECP P-384 R1
    • Koblitz SECP P-256 K1
    • Koblitz SECP P-384 K1
    • Brainpool P-256 R1
    • Brainpool P-384 R1
    • Brainpool P-512 R1
    • other/custom curves optional support
  • Optional Side Channel Attacks countermeasures
  • Input/Output EC point verification
  • Fully synthesizable, synchronous design
  • Highly configurable in terms of performance and resource consumption
  • Minimum operation delay at 200 MHz:
    • Point multiplication:
      • EC256: 2.5 ms
      • EC384: 5.0 ms
    • ECDSA signature generation
      • EC256: 2.6 ms
      • EC384: 5.2 ms
    • ECDSA signature verification
      • EC256: 3.1 ms
      • EC384: 6.3 ms
    • Estimated resource usage
      • from 30k to 110k NAND gates

Applications

  • Digital signature
  • Data integrity
  • Key derivation
  • TLS/SSH/PGP IPsec communication

What’s Included?

  • HDL Source Code
  • Testbench environment
    • Automatic Simulation macros
    • Tests with reference responses
  • Synthesis scripts
  • Technical documentation
  • 12 months of technical support

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
ECDSA verify 256
Vendor
Digital Core Design

Provider

Digital Core Design
HQ: Poland
Founded in 1999, Digital Core Design is a global leader in IP core development, specializing in microprocessor, microcontroller, and communication solutions. With a portfolio of over 100 IP cores, DCD continues to drive innovation in embedded systems, providing cutting-edge solutions for automotive, industrial, IoT, and security applications.

Learn more about Public Key IP core

Smart Engine for Public Key cryptography

This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine

Formally verifying AVX2 rejection sampling for ML-KEM

Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)

Frequently asked questions about Public-Key Cryptography IP cores

What is ECDSA signature verification engine?

ECDSA signature verification engine is a Public Key IP core from Digital Core Design listed on Semi IP Hub.

How should engineers evaluate this Public Key?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP