Inside secure Corporation 
Short Desc. : EIP-123 Crypto Module, EIP-150 Public Key Accelerator, Secure Asset Store, Secure Boot, Secure Debuging
Overview :
Devices that communicate – phones, tablets and the rapidly expanding
Internet of Things – all have data that must be protected from increasingly
sophisticated security attacks. They need to encrypt and decrypt network
access parameters, provide data security services to users and ensure
their own operational integrity. Designers need to build the required
security into these devices while keeping to the development schedule
and budget.
Features : - Low cost, low-power, and small footprint IP
- Internal storage and management for protection and management of sensitive keys and assets
- Encryption engines to offl oad computationally intensive symmetric algorithms: AES, DES, 3DES, ARC4, Camelia, C2 and Multi2
- Hash engine to offl oad computationally intensive hash algorithms: MD5,
- SHA-1 and SHA-2
- True random number generator (TRNG) including FIPS-140/SP800-90 approved DRBG processing
- Easy to integrate AHB or AXI interface for AMBA-based SoC designs
- Embedded DMA controller for high speed symmetric crypto and hash data transfer
- Root of Trust as true hardware interface to on chip non-volatile memory
- Optional extension with high speed Public Key Accelerator for signing operations
Categories :
Portability :
Type : Soft
CST: Webinars Begin on February 9

Internet Business Systems © 2017 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy