Security IP icon

Security

PKA-IP-150 / EIP-150 RSA/ECC Public Key accelerators w/ w/o TRNG

The PKA-IP-150 (EIP-150) is a family of IP cores designed for full scalability and an optimal performance over gate count ratio. The PKA-IP-150 public key accelerators address the unique needs of semiconductor OEMs and provide a reliable and cost-effective IP solution that is easy to integrate into SoC designs. The PKA-IP-150 can be deployed in any semiconductor design that needs key exchange or key generation at high performance or in low power consumption.

The PKA-IP-150 public key accelerators combine the PKA-IP-28, TRNG-IP-76 with an AMBA interface such as AXI or AHB.

Up to 4160-bit modulus size for RSA & 768-bit modulus for prime field ECC operations. TRNG

9 different performance configurations ranging from 40K to 555K gates designs.

Public Key signature generation, verification & key negotiation with little involvement of Host. FIPS-140 approved.

How the PKA-IP-150 works

The PKA-IP-150 public key accelerators are suitable for a wide range of applications:

  • Small gate count (IoT or mobile) applications for secure boot, software public key signature checking and ‘occasional’ public key operations as used for IPsec and MACsec channel setup and firmware download signatures.
  • Medium to high performance (Elliptic Curve) Diffie-Hellman key negotiation engines for secure router boxes, secure network interfaces and SSL servers.
  • Medium to high performance secure Public Key signature generator/checker engines in Hardware Security Modules.
PKA-IP-150 RSA/ECC Public Key Accelerators w w/o TRNG
PKA-IP-150 RSA/ECC Public Key Accelerators w w/o TRNG

The PKA-IP-150 is available in 9 different performance configurations ranging from 40K to 555K gates designs, each providing the full set of TRNG and PKA operations with up to 4160-bit modulus size for modular exponentiations and 768-bit modulus for prime field ECC operations. The PKA-IP-150 is a security conscious design and can be provided with or without protection against side channel attacks.

Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

PKA-IP-150 Information

Key benefits:

  • Silicon-proven implementation.
  • FIPS approved in VaultIP
  • Fast and easy to integrate into SoCs.
  • Flexible layered design.
  • Complete range of configurations.
  • World-class technical support.
  • In-field upgradable Firmware.
  • Driver Development Kit.

Upcoming Webinar: AI Requires Tailored DRAM Solutions