Ellipsys 2.0 Software Released by Elliptic - features Support for Elliptic Curve Cryptography & RSA Security
Update: Synopsys Expands Security Solutions with Acquisition of Elliptic Technologies (June 29, 2015)
Ottawa, Canada, May 9, 2007 - Security IP provider Elliptic today announced that it has completed the 2.0 release of its Ellipsys security software. This release upgrades the algorithms implemented to include a complete set of asymmetric functions such as Elliptic Curve Cryptography (ECC) and RSA functions. Elliptic Curve Cryptography is being implemented by the U.S. Government as part of the Suite B standard and the cryptographic modernization program sponsored by the National Security Agency (NSA). ECC is also used in digital rights management and mobile handsets due to the high security it can offer at much smaller key sizes than the equivalent RSA algorithms.
Ellipsys is offered as two different products - the ESS-01 Symmetric Cryptography library and the ESS-02 Asymmetric Cryptography library. The ESS-02 asymmetric library now includes the following functions:
- Elliptic Curve Cryptography
- EC-DSA Generation and Verification
- EC Diffie-Hellman
- EC IES Encryption and Decryption
- Key Generation
- RSA Public Key Cryptography
- Key Generation
- Encryption and Decryption
- Signature and Verification
The ESS-01 symmetric library offers a comprehensive set of ciphers, modes and authentication algorithms such as:
- Ciphers
- AES
- DES/3DES
- Ksumi
- RC4
- Modes (supported by all ciphers)
- CBC
- CFB
- CTR
- GCM
- XTS
- Hashes
- MD5 and SHA-1 through SHA-512
- Message Authentication Algorithms (MACs)
- CMAC
- HAMC
- XCBC
"With the inclusion of ECC and RSA asymmetric algorithms, the library is now complete and can be used for solutions ranging from mobile handsets through to high-end, top secret applications in government and military applications." said Al Hawtin, VP of Marketing and Business Development. "Customers can also leverage Elliptic's team of software developers to augment internal teams and ensure that their demanding security applications meet the security requirements and are delivered on time and on budget."
About EllipticHeadquartered in Ottawa, Elliptic provides semiconductor intellectual property (IP) cores and software for secure communications ranging from low power to multi-gigabit per second implementations. Elliptic SIP cores enable system-on-chip designers to efficiently balance power, performance and silicon area in complex security-based systems. Demanding customers in markets such as implantable devices, wireless, storage, digital rights management (DRM), Suite B and high performance communications trust Elliptic IP solutions.
|
Related News
- Faraday Launches SoReal! 2.0 Virtual Platform to Support Its FPGA Board for Early SoC Software Development
- Vivante's OpenGL ES 2.0 Conformance Submission First to Support Depth Texture Extension
- Altera's FPGAs Are First to Demonstrate Support for PCI Express 2.0
- Arasan Announces Support for SDIO Version 2.0 in its SDIO Device IP
- Arasan Announces Support for Part A2 of the SDIO Version 2.0 Specification
Breaking News
- Logic Design Solutions launches Gen4 NVMe host IP
- ULYSS1, Microcontroller (MCU) for Automotive market, designed by Cortus is available
- M31 is partnering with Taiwan Cooperative Bank to launch an Employee Stock Ownership Trust to strengthen talent retention
- Sondrel announces CEO transition to lead next phase of growth
- JEDEC Publishes LPDDR5 CAMM2 Connector Performance Standard
Most Popular
- Arm's power play will backfire
- Alphawave Semi Selected for AI Innovation Research Grant from UK Government's Advanced Research + Invention Agency
- Secure-IC obtains the first worldwide CAVP Certification of Post-Quantum Cryptography algorithms, tested by SERMA Safety & Security
- Weebit Nano continuing to make progress with potential customers and qualifying its technology Moving closer to finalisation of licensing agreements Q1 FY25 Quarterly Activities Report
- PUFsecurity Collaborate with Arm on PSA Certified RoT Component Level 3 Certification for its Crypto Coprocessor to Provide Robust Security Subsystem Essential for the AIoT era
E-mail This Article | Printer-Friendly Page |