Security Icon


ARC4-IP-44 / EIP-44 ARC4 Stream Cipher Accelerators

The ARC4-IP-44 (EIP-44) is IP for accelerating the ARC4 stream cipher algorithm (used for legacy SSL & IPsec) up to 5bps @600MHz. Designed for fast integration, low gate count and full transforms, the ARC4-IP-44 accelerator provides a reliable and cost-effective embedded IP solution that is easy to integrate into high speed crypto pipelines.

ARC4 family of accelerators

Available in several configurations / performance grades

Library element for security packet engines

How the ARC4-IP-44 / EIP-44 ARC4 Stream Cipher Accelerators work

The ARC4-IP-44 is a family of the cryptographic library elements in Inside Secure’s HW IP library. The accelerators include I/O registers, encryption and decryption cores, and the logic for feedback modes and key scheduling.

Sustained performance for any object sizes ranges up to 5Gbps depending on the configuration and area. Gate count is about 7k to 32k gates depending on the configuration.

Inside Secure also offers the AES-IP-39 / EIP-39 that supports AES modes and can be provided including counter measures against side channel attacks and fault injection attacks.

ARC4-IP-44 legacy ARC4 accelerators
ARC4-IP-44 legacy ARC4 accelerators

ARC4-IP-44 Information

Key benefits:

  • Silicon-proven implementation
  • Fast and easy to integrate into SoCs
  • Flexible layered design
  • Complete range of configurations
  • World-class technical support


  • Wide bus interface (32 bit data, 128 bit keys) or 32 bit register interface
  • Key sizes: 40 and 128 bits
  • Fully synchronous design


  • AES-IP-32 / EIP-32 AES ECB accelerators
  • AES-IP-36 / EIP-36 AES ECB/CBC/CTR accelerators
  • AES-IP-37 / EIP-37 AES Key Wrap accelerators
  • AES-IP-38 / EIP-38 AES XTS/GCM accelerators
  • AES-IP-39 / EIP-39 AES ECB/CBC/CTR/CCM/GCM accelerators
Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

Related Markets & Applications

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation