USB2.0 OTG PHY supporting UTMI+ level 3 interface - 28HK/55LL
Elliptic Technologies Offers Solution to Longstanding Security challenge - implementing asymmetric or public key cryptography
Update: Synopsys Expands Security Solutions with Acquisition of Elliptic Technologies (June 29, 2015)
February 16, 2010 – Ottawa, Canada: Security IP provider Elliptic today announced that it has released a comprehensive solution to perhaps the most difficult challenge today facing designers in security – implementing asymmetric or public key cryptography.
Asymmetric cryptography is used in key exchange and digital signature algorithms which are used, for example, to establish encrypted sessions on the Internet. The algorithms used in asymmetric cryptography are very difficult to implement and the new Elliptic tools significantly simplify the process.
Elliptic offers customers great flexibility in implementing asymmetric cryptography. Customers can choose to implement an all software solution, the Ellipsys security toolkit with asymmetric algorithms such as Elliptic Curve Cryptography (ECC) using prime field curves from 160- to 521-bits, binary field curves ranging from 163- to 571-bits and RSA cryptography with key sizes of up to 4096-bits. Ellipsys is now shipping at Release 3.2 which offers greatly enhanced features such as broad industry standard APIs, extensive support for X.509 certificates and key generation capabilities.
In many cases, developers implementing asymmetric cryptography find an all software solution too slow to meet the system performance requirements due to the computationally intense operations required. Elliptic offers a family of hardware co-processors engines including engines targeted at both RSA and prime field ECC and a binary curve ECC engine. In both cases, Ellipsys software integrates the hardware operations through simple compile time switches thereby ensuring seamless transition between all software solutions to those which support hardware offload. Elliptic hardware offload is available as either FPGA or ASIC solutions for maximum flexibility.
It features significantly increased throughput and reduced size while preserving backwards compatibility with the silicon proven predecessor, the CLP-23. Depending on the configuration selection, the CLP-300 performance can be as much as 130% higher than the CLP-23.
“With the enhanced capabilities of Ellipsys 3.2 and the enhanced performance of the CLP-300 Public Key Accelerator, Elliptic offers the industry’s most comprehensive system solution for asymmetric cryptography.” said Richard White, President and CEO of Elliptic Technologies. “When combined with the industry’s best quality and renowned post-sales support, Elliptic has become by far the preferred vendor for developers wishing to complete these complex security designs on time and on budget.”
|
Related News
- Jetway Security Micro Adopts Elliptic's Public Key Cryptography Engine
- Bluink adds FIDO U2F Security Key Functionality to Injector with Elliptic Technologies' Cryptography
- Synochip adopts Elliptic's Public Key Cryptography Engine and Ellipsys Software
- FortifyIQ Introduces FortiPKA-RISC-V: A Breakthrough in Public Key Cryptography Acceleration
- Silex Insight's Public Key Cryptography Selected for Fungible's Groundbreaking DPU
Breaking News
- Logic Design Solutions launches Gen4 NVMe host IP
- ULYSS1, Microcontroller (MCU) for Automotive market, designed by Cortus is available
- M31 is partnering with Taiwan Cooperative Bank to launch an Employee Stock Ownership Trust to strengthen talent retention
- Sondrel announces CEO transition to lead next phase of growth
- JEDEC Publishes LPDDR5 CAMM2 Connector Performance Standard
Most Popular
- Arm's power play will backfire
- Alphawave Semi Selected for AI Innovation Research Grant from UK Government's Advanced Research + Invention Agency
- Secure-IC obtains the first worldwide CAVP Certification of Post-Quantum Cryptography algorithms, tested by SERMA Safety & Security
- Weebit Nano continuing to make progress with potential customers and qualifying its technology Moving closer to finalisation of licensing agreements Q1 FY25 Quarterly Activities Report
- PUFsecurity Collaborate with Arm on PSA Certified RoT Component Level 3 Certification for its Crypto Coprocessor to Provide Robust Security Subsystem Essential for the AIoT era
E-mail This Article | Printer-Friendly Page |