Is this your business? Claim it to manage your IP and profile
The DES/3DES Ultra-Compact Core is designed for high-performance encryption and decryption using both DES and Triple DES algorithms. This core processes 64-bit data blocks and utilizes a key size of 56 bits, with one to three keys for enhanced security. It complies with the NIST FIPS 46-3 standard and is optimized for minimal gate count, making it ideal for compact, low-resource environments. Its flexibility is enhanced by several operation modes, such as ECB, CBC, and CTR, providing robust data protection solutions across multiple applications.
The AES Key Wrap Core, compliant with NIST specifications and RFC 3394, implements secure key management operations for AES keys. It supports both wrap and unwrap functions utilizing 128 or 256-bit Key Encryption Keys (KEK), ensuring robust protection for sensitive key data. Engineered for a flow-through design, this core integrates easily into existing systems, providing efficient and secure key management for digital rights management and secure communications. Minimal external dependencies enhance its suitability for diverse security applications.
The True Random Number Generator core is capable of producing high-quality random numbers for security-critical functions. Compliant with NIST's SP800-90 and Diehard test suites, this core offers intrinsic randomness suitable for a variety of applications, including secure communications, electronic financial transactions, and military systems. Its compact design integrates seamlessly into hardware, supporting cryptographic protocols that rely on true randomness for security resilience. With automatic re-seeding and an internal random seed source, the core ensures continuous high entropy output.
The AES IP Core delivers an ultra-compact implementation of the Advanced Encryption Standard using the Rijndael algorithm. Designed for both ASIC and FPGA applications, this core supports 128-bit data blocks with a choice of 128, 192, or 256-bit keys. It is FIPS-197 validated, ensuring that it adheres to federal standards for cryptographic security. This core is fully self-contained, requiring no external memory, and is available in various cipher modes including ECB, CBC, OFB, and CFB, making it adaptable to a variety of security needs.
Specialized in delivering secure communication for LTE networks, the SNOW 3G LTE Encryption Core follows the ETSI SAGE specification. It generates a 32-bit keystream using a 128-bit key, supporting the UEA2 and UIA2 algorithms. Optimized for minimal size while achieving high throughput, this core is fully synchronous and does not require external memory, enhancing its adaptability for mobile communication systems. With a design built to withstand scrutiny, it presents a robust solution for maintaining data integrity and confidentiality in mobile services.
The SHA Cryptographic Hash Cores deliver robust message digest solutions using SHA-1 and SHA-2 algorithms. These cores are critical for data integrity and authentication in secure communication protocols. Their parameterized flow-through design allows easy incorporation into data paths or connection with microprocessors. With variations supporting data bus widths tailored for specific utilization, they are adaptable to secure digital signatures, TLS, SSL, and other applications demanding reliable cryptographic hashing.
The Kasumi Cipher core is engineered for compliance with ETSI SAGE and 3GPP standards, specifically designed for mobile communication encryption. By processing 64-bit data blocks with a 128-bit key, it ensures secure transmission for UMTS networks. Known for its compactness, the core minimizes resource usage without compromising speed, making it a preferred choice in security applications requiring efficiency and reliability. The design supports various operational modes and can be fully integrated into systems running secure telecommunications protocols.
Designed in compliance with NIST's SP800-90 standards, the Cryptographically Secure Pseudo Random Generator core offers robust random number generation for secure applications. It uses a CTR_DRBG algorithm to generate random numbers with up to 256 bits of security strength. The core is fully autonomous and optimized for small size, making it easily integrable into wireless communication systems, secure financial transactions, and digital rights management solutions. Its secure architecture assures high-quality randomness, essential for cryptographic applications.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
No credit card or payment details required.
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.