Cryptography and Protection Engine

Showing all 7 results

  • AES Core – High Stable

    AES IP is a AES Engine compliant to NIST FIPS-197 Advanced Encryption Standard. The IP can be programmed to encrypt or decrypt a 128-bit blocks of data using a 128-bit, 192-bit or 256-bit key.

    AES IP is designed to require minimum logic resources rendering it an ideal solution for low power applications.
    There is parameter option given to select Processing Size. User can select 8bit, 32bit, 64bit and 128bit processing.

  • AES Core

    AES IP is a AES Engine compliant to NIST FIPS-197 Advanced Encryption Standard. The IP can be programmed to encrypt or decrypt a 128-bit blocks of data using a 128-bit, 192-bit or 256-bit key.

    AES IP is designed to require minimum logic resources rendering it an ideal solution for low power applications.
    There is parameter option given to select Processing Size. User can select 8bit, 32bit, 64bit and 128bit processing.

  • Data Protection Engine(Obfuscation)

    Very Low gate Count, Hardware level, Software Data Isolation and Master level Data Protection Engine using Random Controlled Obfuscation and De-Obfuscation.

  • Placeholder

    Temper Resistant AMBA AHB/ AXI Slave Memory Controller

    This is Noise Resistant, Temper Resistant (NR TR), fully protocol Complaint AHB Master/ Slave Memory controller and memory Security Block. It secures data and transfer with use of additional sideband signals on AMBA bus systems. It completely hides AMBA Transfers from debug and SPA/ DPA Analysis, Invasive and Non Invasive attacks.

  • Placeholder

    Noise Resistant, High Stable(NRHS), AMBA AHB/ AXI Master/ Slave Security Block

    This is Noise Resistant, High Stable(NRHS), fully protocol Compiaint AHB Master/ Slave Security Block. It secures data and transfer with use of additional sideband signals on AMBA bus systems. It completely hides AMBA Transfers from debug and SPA/ DPA Analysis, Invasive and Non Invasive attacks.

  • AMBA-AHB Security

    • Completely Hides the Transactions. No Power Profiling is possible.
    • Hides the Data Completely from Debug by changing Key periodically.
    • Self managed key. Can be randomized further across devices using Random Number generators.
    • Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.
  • AMBA-AXI Security

    • Completely Hides the Transactions. No Power Profiling for SPA and DPA is possible once this IP is implemented on SOC.
    • Hides the Data Completely from Debug by changing Key periodically.
    • Self managed key. Can be randomized further across devices using Random Number generators.
    • Multi level Locking. Multiple master Can operate on single Back Bone with Different Access Levels and Access Regions.