To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain dedicated hardware accelerators that offload challenging tasks, such as network protocol computation, AI and deep learning, and – most importantly – security. For a security performance that matches the speed of the new SoCs we are offering a scalable hardware IP block that handles encryption at speeds from a few Gbps to over 100Gbps, depending on the needs.
The Network Security Crypto Accelerator is used to accelerate/offload MACsec, IPsec, VPN, TLS/SSL, disk encryption, or any other custom application, requiring symmetric cryptography algorithms. It can also be combined with the eSecure Root of Trust module to form a complete secure enclave, that will handle the keys without exposing them to the software, which makes it suited for even the most regulated and security-sensitive industries.
Direct Memory Access (DMA)
Native speeds of hardware cores may remain largely theoretical if the host processor is not able to deliver data to the crypto module and process the results at the same speed. That is why this Network Security Crypto Accelerator includes a Direct Memory Access (DMA) interface to the host memory space. Here, the operations are efficiently offloaded via a built-in scatter-gather DMA optimized to handle networks packets of any size.
The platform integrates your desired selection of our cryptographic IP cores, a DMA and software layers providing a complete solution.
Network Security Crypto Accelerator
Overview
Key Features
- Scalable architecture & crypto engines for optimal performance/resource usage
- Configurable for perfect application fit
- 100% CPU offload with low latency and high throughput
- Optional DPA countermeasures for AES and SM4
- Full software/driver support - Linux drivers (Crypto API integration)
- Easy integration - AXI interface
- Low power
- Can use keys (from eSecure or others) hidden from CPU
Benefits
- Offload the compute intensive Public Key operations (Diffie-Helmann, Signature Generation and Verification)
Block Diagram
Applications
- Secure Communication (TLS, MACsec, IPSec, ...)
- Secure Storage
Deliverables
- Netlist or RTL
- SW drivers (Linux)
- Scripts for implementations
- Self-checking RTL test-bench based on referenced vectors
- Documentation
Technical Specifications
Availability
Now