Security Icon

Security

AES-IP-39 / EIP-39 AES “All Modes” Accelerators

The AES-IP-39 (EIP-39) is IP for accelerating the AES symmetric cipher algorithm (FIPS-197), supporting all NIST modes including ECB, CBC, CTR, CFB, OFB, CCM, GCM, CBC-MAC, CMAC, XTS, F8, F9 modes of operation up to 6.4Gbps @1GHz. Designed for fast integration, low gate count and full transforms, the AES-IP-39 accelerator provides a reliable and cost-effective embedded IP solution that is easy to integrate into security modules needing versatile crypto.

AES family of accelerators, all modes.

Optional counter measures against side channel attacks and fault injection attacks.

Library element for VaultIP platform security engine.

How the AES-IP-39 / EIP-39 AES “All Modes” Accelerators work

The AES-IP-39 is a family of the cryptographic library elements in Inside Secure’s HW IP library. For example, the lightweight configuration of the AES-IP-39 is the cipher core embedded in all Vault-IP platform security engines as well as the Crypto-IP-120 DMA crypto core. The accelerators include I/O registers, encryption and decryption cores, and the logic for feedback modes and key scheduling.

AES-IP-39 "all modes" accelerator
AES-IP-39 "all modes" accelerator

Sustained performance for any object sizes ranges from 1Gbps to 6.4Gbps depending on the configuration and area. Gate count is between 27K and 45k gates depending on the configuration.

The AES-IP-39 / EIP-39 can be provided including counter measures against side channel attacks and fault injection attacks.

AES-IP-39 AES ECB/CBC/CTR/CCM/GCM Accelerators
AES-IP-39 AES ECB/CBC/CTR/CCM/GCM Accelerators

AES-IP-39 Information

Key benefits:

  • Silicon-proven implementation.
  • Fast and easy to integrate into SoCs.
  • Flexible layered design.
  • Complete range of configurations.
  • World-class technical support.
 

Features:

  • 32 bit register interface.
  • Key sizes: 128, 192 and 256 bits.
  • Includes key scheduling hardware.
  • Feedback modes: ECB, CBC, CTR, OFB-128, 
CFB-128.
  • Protocol modes: CCM, GCM, CMAC and XCBC-MAC.
  • Optional modes: AES-XTS, OFB, f8 and f9.
  • Fully synchronous design.
  • Low Speed, Medium Speed, High Speed versions.
  • Fully synchronous design.
  • Optional counter measures against side channel attacks and fault injection attacks.
  • Standard Compliance: FIPS-197, NIST-SP800-38A/B/C/D/E
 

Alternatives:

  • AES-IP-32 / EIP-31 AES ECB accelerators
  • AES-IP-36 / EIP-36 AES ECB/CBC/CTR accelerators
  • AES-IP-37 / EIP-37 AES Key Wrap accelerators
  • AES-IP-38 / EIP-38 AES XTS/GCM accelerators
  • AES-IP-39 / EIP-39 AES ECB/CBC/CTR/CCM/GCM accelerators
Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

Related Markets & Applications

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation