Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Cryptography Software Library

Advanced Cryptography Software Library Semiconductor IP Solutions

In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.

Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.

The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.

At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.

All semiconductor IP
17
IPs available

RV12 RISC-V Processor

The RV12 is a versatile, single-issue RISC-V compliant processor core, designed for the embedded market. With compliance to both RV32I and RV64I specifications, this core is part of Roa Logic's 32/64-bit CPU offerings. Featuring a Harvard architecture, it efficiently handles simultaneous instruction and data memory operations. The architecture is enhanced with an optimizing folded 4-stage pipeline, maximizing the overlap of execution with memory access to reduce latency and boost throughput. Flexibility is a cornerstone of the RV12 processor, offering numerous configuration options to tailor performance and efficiency. Users can select optional components such as branch prediction units, instruction and data caches, and a debug unit. This configurability allows designers to balance trade-offs between speed, power consumption, and area, optimizing the core for specific applications. The processor core supports a variety of standard software tools and comes with a full suite of development resources, including support for the Eclipse Integrated Development Environment (IDE) and GNU toolchain. The RV12 design emphasizes a small silicon footprint and power-efficient operation, making it ideal for a wide range of embedded applications.

Roa Logic BV
CPU, Cryptography Software Library, IoT Processor, Processor Cores
View Details

PUFrt

PUFrt stands as a bastion of semiconductor security, serving as a Hardware Root of Trust (HRoT) with unparalleled credibility. Its architecture is designed to generate and store hardware root keys securely within the chip, utilizing Physically Unclonable Functions (PUF) and a true random number generator (TRNG). These features ensure that cryptographic operations are fortified with a unique and unclonable identity, mitigating risks of physical tampering and creating a robust defense against reverse engineering.<br><br>Integral to its design is the secure OTP (One-Time Programmable) memory, which stores sensitive keys and data, adding a layer of protection that has been validated through rigorous security certifications. The PUFrt's anti-tamper technology guards against unauthorized access, ensuring the integrity of both hardware and software environments. Moreover, its design facilitates easy integration with various system architectures, expanding its applications beyond traditional security implementations.<br><br>Applications of PUFrt span from IoT devices to sophisticated computing systems, where its role as a secure entry point into connected ecosystems is crucial. By embedding a secure foundation, PUFrt not only strengthens semiconductor reliability but also enhances performance efficiency. This holistic approach to security makes it a linchpin in modern semiconductor design, supporting each stage of the device lifecycle with comprehensive, hardware-anchored security protocols.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PQCryptoLib Embedded

Highly-optimized PQC implementations, capable of running PQC in < 15kb RAM PQCryptoLib-Emebedded is a versatile, CAVP-compliant version of PQCryptoLib, PQShield’s CMVP-certified library of post-quantum cryptographic algorithms. With its design focused on ultra-small area efficiency, PQCryptoLib-Embedded has been specifically designed for embedded systems, microcontrollers and memory-constrained devices. It could be the first step towards a hardware solution for providing PQC integration to devices already in the field.

PQShield
Cryptography Software Library, Embedded Security Modules
View Details

Titanium Ti375 - High-Density, Low-Power FPGA

The Titanium Ti375 is a flagship FPGA product that balances high density and low power consumption, making it ideal for a range of applications requiring significant computational capabilities with energy efficiency. This FPGA includes Efinix's Quantum™ compute fabric, which provides advanced I/O interfaces including SerDes transceivers, LPDDR4 DRAM controllers, and MIPI D-PHY interfaces. These features make the Ti375 a versatile choice for system designers aiming to integrate complex interfaces in a compact footprint.\n\nThe Ti375 FPGA excels in areas such as edge computing and high-performance data processing, supporting a wide range of applications from industrial automation to consumer electronics. With its hardened RISC-V block, the Titanium Ti375 can handle demanding tasks without external processors, offering an on-chip solution that reduces both footprint and power usage. Furthermore, it includes capabilities like stream encryption and authentication, ensuring secure data processing in sensitive environments.\n\nDesigned with future-proofing in mind, the Ti375 supports integration into systems with rigorous longevity requirements. It aligns with Efinix's commitment to deliver reliable technology over extended product lifecycles, catering to industries that necessitate stability and long-term support. With a process node efficiently structured at 16nm, the Titanium Ti375 offers a compact size without compromising on performance, making it an excellent choice for ongoing innovations in embedded systems, communications, and power-sensitive applications.

Efinix, Inc.
All Foundries, TSMC
16nm
Content Protection Software, Cryptography Software Library, Embedded Security Modules, PLL, SDRAM Controller
View Details

Alcora V-by-One HS Daughter Card

The Alcora V-by-One HS Daughter Card is tailored for high-speed digital interfacing, specifically aligning with FPGA development boards via FMC connectors. The card features 8 RX and 8 TX lanes, with the option to combine two FMC cards for a total of 16 lanes. This configuration supports video resolutions up to 4K at 120Hz or 8K at 30Hz, demonstrating its capability to handle large volumes of data efficiently. Designed to meet the demanding requirements of high-resolution and high-frame-rate applications, the Alcora card integrates dual clock generators to optimize signal clarity by synthesizing the transceiver reference clock and minimizing jitter. This characteristic is crucial in maintaining data integrity and ensuring smooth video performance, making the Alcora an optimal choice for flat panel display integration. Featuring flexible connectivity options, the Alcora card is available in both 51-pin and 41-pin header variants. This design ensures that it can provide a comprehensive interface to meet various technical challenges, advancing the capabilities of high-speed digital communications within FPGA systems.

Parretto B.V.
AMBA AHB / APB/ AXI, Analog Filter, Audio Interfaces, Cryptography Cores, Cryptography Software Library, V-by-One, VESA
View Details

PQCryptoLib

FIPS 140-3 CMVP compliant, CAVP PQC cryptographic library designed for PQ/T Hybrid PQCryptoLib is a general-purpose FIPS 140-3 CMVP and CAVP-certified cryptographic library. It’s been designed for a wide variety of applications and provides the latest NIST-standardized post-quantum and classical algorithms in a software environment. With a configurable, secure, and easy-to-use API, PQCryptoLib is optimized for crypto-agility, particularly when it comes to FIPS-compliant hybrid PQ/T solutions, and with crypto-agility in mind, it’s built to protect against the threat of ‘harvest-now-decrypt-later’ attacks. The aim of PQCryptoLib is to help organizations transition smoothly and securely to quantum resistance in a manageable, easy-to-integrate solution.

PQShield
Content Protection Software, Cryptography Software Library
View Details

AndeSoft SW Stack

AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.

Andes Technology
CPU, Cryptography Cores, Cryptography Software Library
View Details

PQSDK

Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments

PQShield
Cryptography Cores, Cryptography Software Library
View Details

Securyzr Key Management System

The Securyzr Key Management System is designed to handle complex cryptographic key management centrally, ensuring secure generation, distribution, and storage of keys. This system is integral for maintaining the security of cryptographic protocols which form the backbone of secure communications and digital identity verifications. Featuring flexible and scalable key management strategies, this product is essential for industries with stringent data protection requirements such as banking, telecommunications, and cloud services. It is engineered to seamlessly integrate with a variety of IT infrastructures, offering powerful protective measures against unauthorized access and enhancing the overall security posture of an organization.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

SHA Hashing for Secure Data Verification

Helion Technology delivers efficient hashing solutions through their SHA family of products, including SHA-1 and the more secure SHA-2 family, as well as MD5 for legacy purposes. These hashing cores are implemented to transform arbitrary-length files or messages into unique, fixed-length digests, which act as veritable signatures of the original data. These secure hash algorithms (SHAs) are integral to digital signatures and message authentication applications, underpinning protocols like IPsec and TLS/SSL by ensuring integrity and authenticity. With configurations optimized for high-speed and low-area applications, Helion's hashing solutions prove effective in systems needing cryptographic checks. The cores are partitioned into the FAST and TINY controls, each catering to different throughput and resource trade-offs. FAST delivers performance up to 4Gbps, focusing on speed, while TINY configurations are geared towards minimal resource utilization, providing an ideal solution for energy-efficient, low-data rate needs in both FPGA and ASIC technologies.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Cryptography Software Library
View Details

PUFcc

The PUFcc Crypto Coprocessor sets a new standard in embedded security solutions by integrating a robust Hardware Root of Trust with advanced cryptographic capabilities. Tailored for modern applications, PUFcc features a comprehensive set of NIST-certified cryptographic algorithms that enhances device security across all stages of its lifecycle. This coprocessor excels in managing key generation, storage, and execution of sophisticated cryptographic tasks, embedding security deeply within the hardware.<br><br>PUFcc distinguishes itself with its high-speed performance and adaptability to contemporary security standards. By including support for TLS 1.3, it meets emerging demands for secure communication protocols in IoT and AI applications. Its design is optimized for ease of integration, featuring standard interfaces that enhance the design process and reduce time to market for new semiconductor products.<br><br>Operability across different system architectures is enhanced through PUFcc's ability to interface with various external memory systems thus extending the security functions beyond conventional boundaries. It is particularly beneficial for sectors demanding high security and flexibility, offering a robust foundation for safe data transactions in critical infrastructures.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator by ResQuant is designed to cater to diverse client needs, offering a broad range of configurable options. It integrates seamlessly with the complete set of NIST post-quantum cryptography standards, including algorithms like Dilithium, Kyber, and XMSS. This flexibility extends further by allowing customers to incorporate their own algorithms. This cryptography accelerator is straightforward to tailor in terms of performance and size, helping cater to varied application requirements. Its design incorporates defenses against various side-channel attacks, although some features like resistance to Differential Power Analysis (DPA), timing attacks, and Simple Power Analysis (SCA) are in development. The adaptability of the accelerator is enhanced with AXI 4 compatibility, ensuring it can be easily integrated into complex system-on-chip designs. Customers can expect a future-proof, versatile cryptographic solution that addresses both existing and emerging cybersecurity challenges. This product represents a significant advancement for organizations transitioning to quantum-safe security solutions.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Individual IP Core Modules

The Individual IP Core Modules offered by ResQuant are designed to support a wide array of post-quantum cryptography needs, featuring compatibility with all recognized NIST PQC standards. These include pioneering algorithms such as Dilithium, Kyber, XMSS, and SPHINCS+, guaranteeing breadth in cryptographic applications. These modules offer comprehensive cryptographic functions like advanced encryption standards using AES, hashing with SHA2 and SHA3 families, and generation of true random numbers, posing as a versatile security solution adaptable to a variety of environments. Scheduled for future updates with additional protocols like the FRODO Key Encapsulation Mechanism, these IP cores promise continuous alignment with evolving cryptographic needs. Their structure accommodates substantial flexibility in terms of performance tuning and system integration, enabling easy deployment in diverse application scenarios, from IoT devices to large-scale data centers, making them a staple for entities preparing for quantum computing advancements. These modules ensure security frontiers remain resilient against future computational intricacies.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators
View Details

Cryptographic Core

The Cryptographic Core offers a comprehensive suite of classical cryptographic solutions. This product leverages well-established algorithms like AES for symmetric encryption and ECC for asymmetric encryption. Its design caters to both high and low-end applications, ensuring compatibility across various devices. This core is crucial for maintaining confidentiality and integrity in systems where traditional cryptography still reigns supreme. With the increasing vulnerability posed by advancing technology, including potential quantum threats, this Cryptographic Core provides secure encryption and decryption processes. Utilizing advanced algorithms such as RSA and variants of elliptic curve cryptography (ECC), it supports the secure exchange of information. Despite looming quantum computing challenges, many elements of classical cryptography remain effective and secure. The Cryptographic Core stands as a reliable option while industries transition towards more robust quantum-safe systems. It offers flexibility and adaptability, accommodating specific security needs through customization and configuration for various performance levels.

PQ Secure Technologies, LLC
AI Processor, Cryptography Cores, Cryptography Software Library, Security Processor, Standard cell
View Details

Suite-Q SW

Suite-Q SW consists of a versatile cryptographic software library designed for optimizing code size, stack usage, and performance across various embedded processors and microcontrollers. Available in portable C code and high-speed assembly, Suite-Q SW can be tailored to fit the specific needs of diverse development environments. This library provides extensive support for symmetric and asymmetric cryptographic functions, catering to systems ranging from high-end processors to memory-constrained embedded devices. By facilitating efficient cryptographic computations, Suite-Q SW ensures minimal impact on system performance while maximizing data security. Its adaptability is marked by simple integration modules that work seamlessly with hardware accelerators, enabling enhanced cryptography for both standard and custom specifications. This reliability makes Suite-Q SW an indispensable tool for ensuring secure communication channels while maintaining an optimal balance between speed and resource utilization.

PQ Secure Technologies, LLC
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

JTAG TAP Controller

The JTAG TAP Controller provides a standardized interface for testing and debugging digital circuits. This Test Access Port controller facilitates complex system testing with minimal overhead, allowing seamless interaction with various tools and environments. It is vital for applications requiring reliable and consistent debug access, such as in-circuit testing and verification.

Beyond Semiconductor
Cryptography Software Library
View Details

Hardware Security Module

The Hardware Security Module (HSM) developed by Frontgrade Gaisler is an IP core designed to ensure the highest standards of security for cryptographic operations. This module plays a critical role in safeguarding sensitive information through secure storage, key management, and encryption processes, suited for both terrestrial and space environments. HSM provides a secure operating environment where cryptographic keys are managed and operations are performed with minimal exposure to security vulnerabilities. The IP core's architecture is tailored to support complex secure operations, including boot authentication and data encryption, essential in maintaining data integrity across vulnerable interfaces. Deploying this module promotes a robust layer of security, defending against unauthorized access and ensuring only authenticated actions are executed. The HSM is critical in scenarios requiring high assurance levels, such as defense and aerospace applications where data protection is non-negotiable.

Frontgrade Gaisler
TSMC
28nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt