Vendor: KiviCore Category: Post Quantum

Post-Quantum Key Encapsulation IP Core

The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptogra…

Overview

The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptographic standard defined by NIST FIPS 203. Engineered to withstand both classical and quantum computer attacks, ML-KEM enables two parties to securely establish a shared secret key.

Supporting all ML-KEM parameter sets, the KiviPQC-KEM enables:

  • Two parties to securely establish a shared secret key over an untrusted public channel 

The IP core provides dedicated hardware acceleration for the most computationally demanding operations, ensuring high throughput and low latency while keeping the logic footprint compact.

Designed as a standalone, self-contained module, the KiviPQC-KEM can be integrated seamlessly into any SoC design. It features a standard AMBA® AXI4-Lite interface for straightforward hardware integration and platform-independent C code, HAL, and API drivers for simple software integration into host processor.

Key features

  • NIST FIPS 203 compliant
  • Supports ML-KEM 512/768/1024 parameter sets
  • Supports ML-KEM.KeyGen, ML-KEM.Encaps/Decaps functions
  • Self-contained engine with a minimal attack surface
  • Hardware offloading and acceleration for ML-KEM operations
  • Protection against timing-based side channel attacks

Easy integration

  • Platform agnostic design for any FPGA
  • AMBA® AXI4-Lite Interface
  • Platform agnostic C-Source Code
  • HAL, API and Software drivers included
  • Software examples included
  • Software User Guide included
  • Fast support response within 8 hours

Block Diagram

Benefits

 

  • Easy integration Saves time and effort: Ready to use hardware and software integration.
  • Highly cost-efficient: Saves costs: Post-Quantum IP Core with low licensing costs and free evaluation licences.
  • Minimal logic utilization: Saves resources: Designed and optimized for area-constrained devices. 

Applications

  •  Quantum-Resistant Networks
  •  Public Key Infrastructures
  •  Network Security: MACsec, IPsec
  •  Transport Protocols: TLS, SSL
  •  Secure Communications
  •  Electronic Transactions

What’s Included?

  • System Verilog RTL Source Code or Netlist format
  • Testbenches
  • Integration examples
  • Software HAL & driver source code
  • Software example
  • Documentation

Specifications

Identity

Part Number
KiviPQC-KEM
Vendor
KiviCore
Type
Silicon IP

Files

Note: some files may require an NDA depending on provider policy.

Provider

KiviCore
HQ: Germany
KiviCore is an IP core and solution provider. Based on industry standards, KiviCore offers cyber secure and quantum safe IP cores and hardware/software solutions. Additionally, those can be tailored to specific needs of our customers. We place great emphasis on intensive customer support and guarantee customization to ensure that our solutions perfectly match your requirements. Target applications span a wide range, including Message Authentication Codes (MAC), IPsec and TLS/SSL protocol engines, secure boot engines, encrypted data storage, e-commerce platforms, financial transaction systems, blockchain, or pseudo random bit generation.

Learn more about Post Quantum IP core

How to design secure SoCs Part IV: Runtime Integrity Protection

SoC designers are increasingly challenged to integrate robust security measures into their designs. Modern connected devices, such as automotive Electronic Control Units (ECUs), Internet of Things (IoT) nodes, and industrial control systems, face increasing susceptibility to cyberattacks. This escalating threat landscape underscores the critical importance of mandatory security requirements.

Deploying StrongSwan on an Embedded FPGA Platform, IPsec/IKEv2 on Arty Z7 with PetaLinux and PQC

The objective of this article is to present and analyze a concrete IPsec/IKEv2 deployment on an FPGA-based embedded Linux system. Using an Arty Z7 FPGA platform with PetaLinux and StrongSwan, the focus is on system-level integration rather than protocol theory: how the IPsec stack is built and deployed, how classical and post-quantum key exchange are integrated without modifying standardized protocols, and what architectural trade-offs arise when moving cryptographic operations into programmable logic.

Nine Compelling Reasons Why Menta eFPGA Is Essential for Achieving True Crypto Agility in Your ASIC or SoC

Today’s world is already overly complicated to provide robust product security, with extremely motivated hackers creating novel threats exposing new vulnerabilities every day. But considering tomorrow’s world with the looming threat of quantum computing, expanding AI possibilities and rapidly evolving regional regulations and export control risk with severe financial penalties, this is a daunting challenge.

Providing protection against EMFI attacks

This Agile Analog blog post is focused on describing the dangers of Electromagnetic Fault Injection (EMFI) attacks and outlining the importance of EMFI sensors that are designed to provide protection.

A Comprehensive Post-Quantum Cryptography (PQC) Solution based on Physical Unclonable Function (PUF)

This article provides an in-depth analysis of the specific PPA challenges introduced by PQC and elucidates how PUF-PQC leverages its unique dualtrack strategy to deliver a robust and flexible Hardware Root of Trust (HRoT) across diverse application scenarios. Furthermore, it demonstrates the integration of Physical Unclonable Function (PUF) with a NIST SP 800-90B compliant True Random Number Generator (TRNG) to serve as critical components of PUFrt (Root of Trust), ensuring the security of post-quantum key generation starting from the entropy source.

Frequently asked questions about Post-Quantum Cryptography IP cores

What is Post-Quantum Key Encapsulation IP Core?

Post-Quantum Key Encapsulation IP Core is a Post Quantum IP core from KiviCore listed on Semi IP Hub.

How should engineers evaluate this Post Quantum?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Post Quantum IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP