Bluetooth low energy v5.4 Baseband Controller, Protocol Software Stack and Profiles IP
Elliptic Curve Cryptography (ECC) for range of applications
We provide solutions for the following algorithms based on elliptic curve cryptography:
1. ECC Key Pair Generation
2. Elliptic Curve Digital Signature Algorithm (ECDSA)
Above algorithms are specified in standard ANSI X9.62-2005, they are compliant with FIPS 186-3 (Federal Information Processing Standard) and NIST (National Institute of standard and Technology) suit-B.
FIPS 186-3 has 10 recommended finite fields: 5 prime fields Fp for p192, p224, p256, p384, p521 and 5 binary fields F2m for 163, 233, 283, 409, 571 with three types of curves named random prime, random binary and koblitz curve.
Picus Tech has implemented highly efficient algorithms optimized in ARM native assembly for several ARM cores. The implementations are memory and MIPs efficient.
Features
- Implementation compliant with FIPS 186-3 standard
- Optimized and efficient arithmetic has been implemented both for prime field and binary field
- Optimized and efficient elliptic curve arithmetic
- Fully reentrant implementation allowing multiple instances and ease of memory management
- Low memory foot print
- Choice of modules based on available memory, allowing tradeoff between memory and computations requirements.
- Low computational power
- Suitable for machines having low bandwidth, low computing power, less memory.
Benefits
- Highly optimized implementations. Can be easily ported to any platform
Deliverables
- Object Code
- API documentation
View Elliptic Curve Cryptography (ECC) for range of applications full description to...
- see the entire Elliptic Curve Cryptography (ECC) for range of applications datasheet
- get in contact with Elliptic Curve Cryptography (ECC) for range of applications Supplier