Vendor:
Digital Core Design
Category:
Public Key
high-performance solution for elliptic curve cryptography
Our ECC IP Core represents a cutting-edge solution that brings the power of elliptic curve cryptography to your systems.
Overview
Our ECC IP Core represents a cutting-edge solution that brings the power of elliptic curve cryptography to your systems. Designed with versatility and performance in mind, this IP Core supports a range of essential algorithms, including point multiplication, ECDSA signature generation, and ECDSA signature verification.
With the ability to perform point multiplication, our ECC IP Core enables efficient and secure elliptic curve operations. Point multiplication is a fundamental operation in elliptic curve cryptography, allowing for scalar multiplication of a point on the curve. This operation forms the basis for various cryptographic protocols, including key generation, key agreement, and digital signatures.
In addition to point multiplication, our ECC IP Core facilitates ECDSA signature generation. ECDSA (Elliptic Curve Digital Signature Algorithm) is a widely adopted digital signature scheme that provides robust authentication and data integrity. By leveraging the computational strength of elliptic curves, our IP Core enables rapid and reliable generation of ECDSA signatures, empowering secure digital transactions and communications.
Furthermore, our ECC IP Core includes support for ECDSA signature verification. This capability allows for the efficient verification of ECDSA signatures, ensuring the integrity and authenticity of digital data. By employing optimized elliptic curve computations, our IP Core enables fast and accurate verification, essential for establishing trust and preventing fraudulent activities.
With our ECC IP Core integrated into your systems, you gain a versatile and high-performance solution for elliptic curve cryptography. Its comprehensive support for point multiplication, ECDSA signature generation, and ECDSA signature verification empowers you to implement robust cryptographic protocols, secure digital transactions, and protect sensitive data with ease. Experience the power and efficiency of elliptic curve cryptography through our advanced ECC IP Core.
With the ability to perform point multiplication, our ECC IP Core enables efficient and secure elliptic curve operations. Point multiplication is a fundamental operation in elliptic curve cryptography, allowing for scalar multiplication of a point on the curve. This operation forms the basis for various cryptographic protocols, including key generation, key agreement, and digital signatures.
In addition to point multiplication, our ECC IP Core facilitates ECDSA signature generation. ECDSA (Elliptic Curve Digital Signature Algorithm) is a widely adopted digital signature scheme that provides robust authentication and data integrity. By leveraging the computational strength of elliptic curves, our IP Core enables rapid and reliable generation of ECDSA signatures, empowering secure digital transactions and communications.
Furthermore, our ECC IP Core includes support for ECDSA signature verification. This capability allows for the efficient verification of ECDSA signatures, ensuring the integrity and authenticity of digital data. By employing optimized elliptic curve computations, our IP Core enables fast and accurate verification, essential for establishing trust and preventing fraudulent activities.
With our ECC IP Core integrated into your systems, you gain a versatile and high-performance solution for elliptic curve cryptography. Its comprehensive support for point multiplication, ECDSA signature generation, and ECDSA signature verification empowers you to implement robust cryptographic protocols, secure digital transactions, and protect sensitive data with ease. Experience the power and efficiency of elliptic curve cryptography through our advanced ECC IP Core.
Key features
- Supported algorithms:
- Point multiplication
- ECDSA signature generation
- ECDSA signature verification
- Supported Elliptic Curves
- NIST SECP P-256 R1
- NIST SECP P-384 R1
- Koblitz SECP P-256 K1
- Koblitz SECP P-384 K1
- Brainpool P-256 R1
- Brainpool P-384 R1
- Brainpool P-512 R1
- other/custom curves optional support
- Optional Side Channel Attacks countermeasures
- Input/Output EC point verification
- Fully synthesizable, synchronous design
- Highly configurable in terms of performance and resource consumption
- Minimum operation delay at 200 MHz:
- Point multiplication:
- EC256: 2.5 ms
- EC384: 5.0 ms
- ECDSA signature generation
- EC256: 2.6 ms
- EC384: 5.2 ms
- ECDSA signature verification
- EC256: 3.1 ms
- EC384: 6.3 ms
- Estimated resource usage
- from 30k to 110k NAND gates
Applications
- Digital signature
- Data integrity
- Key derivation
- TLS/SSH/PGP IPsec communication
What’s Included?
- HDL Source Code
- Testbench environment
- Automatic Simulation macros
- Tests with reference responses
- Synthesis scripts
- Technical documentation
- 12 months of technical support
Files
Note: some files may require an NDA depending on provider policy.
Specifications
Identity
Part Number
ECC
Vendor
Digital Core Design
Provider
Digital Core Design
HQ:
Poland
Founded in 1999, Digital Core Design is a global leader in IP core development, specializing in microprocessor, microcontroller, and communication solutions. With a portfolio of over 100 IP cores, DCD continues to drive innovation in embedded systems, providing cutting-edge solutions for automotive, industrial, IoT, and security applications.
Learn more about Public Key IP core
Securing the IoT: Part 1 - Public key cryptography
The authors detail security risks facing the developer of an Internet of Things device and recommend the best public key-based algorithms to use.
Smart Engine for Public Key cryptography
This white paper explains why and how the Smart Engine is ideally applied to Public Key cryptography. It provides more details about the architecture as Baco Silex has implemented it in the BA414E Public Key Crypto Engine
Public key cryptography and security certificates
This article explains public key cryptography and the role of security certificates and the way they are used by the secure protocols to provide ultimate security.
Securing your apps with Public Key Cryptography & Digital Signature
Formally verifying AVX2 rejection sampling for ML-KEM
Formal verification of cryptography comes in many flavours. The levels of abstraction range from high-level protocol designs to machine-level implementations. At each level of abstraction, different target properties and formal verification technologies apply. In this post we look at the latter end of this spectrum and consider a highly-optimized architecture-specific implementation of a core routine of the recent NIST post-quantum standard FIPS-203: Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM)
Frequently asked questions about Public-Key Cryptography IP cores
What is high-performance solution for elliptic curve cryptography?
high-performance solution for elliptic curve cryptography is a Public Key IP core from Digital Core Design listed on Semi IP Hub.
How should engineers evaluate this Public Key?
Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Public Key IP.
Can this semiconductor IP be compared with similar products?
Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.