Elliptic has developed the broadest portfolio of NIST CAVP-certified hardware and software security IP in the industry. Using a structured and rigorous development and verification program, Elliptic’s highly-integrated solutions can be tuned to and targeted at the most demanding applications.
Elliptic’s hardware security IP solutions have the highest degree of size and performance configurability in the industry. They can target specific standards-driven security requirements in numerous markets and applications.
Elliptic’s portfolio of security cores and processors spans four orders of magnitude in performance while leveraging a common set of internal tools and verification environments. These cores provide functions for confidentiality, integrity and authentication, and application-specific bundles.
The hardware IP portfolio consists of three product categories:
- Cryptographic Engines – a family of cipher and hash cores, public key accelerators and random number generators.
- Embedded Security Modules – complex embedded security solutions targeted at medium performance and cost-constrained applications. The modules are designed to deliver the cryptographic functions required by the target application. Modules contain a common AMBA AXI/AHB slave interface and use a single memory block for storing messages and context.
- Security Protocol Accelerators and Processors – complex, intelligent co-processors and processors that implement full security protocols. They are ideal for applications that require higher performance. Elliptic’s solutions in this category use master/slave AMBA AXI/AHB or FIFO interfaces to handle message traffic and control; they include scatter/gather DMAs as well as important capabilities such as interrupt coalescence, virtualization and QoS.
Elliptic’s middleware provides a common interface to core cryptographic functionality for use in application software. The middleware components include cryptographic algorithms and supporting math functions as well as SDKs for interfacing to hardware IP.
Ellipsys Cryptography Middleware is a CAVP-certified cryptographic library that you can configure to optimize size or speed. Ellipsys is written in portable C code and also includes platform-specific optimizations for ARM, x86, x86_64 and PowerPC. Ellipsys plug-in architecture provides easy integration and offload of hardware devices.
To simplify complex operations, the hardware SDKs offer register abstraction headers as well as example interfaces for device operations.
Elliptic’s high-level, security-based applications cover a range of markets from content protection to platform and networking security. The content protection standards, HDCP and DTCP-IP, are available as SDKs for a variety of platforms (Android, Linux, Windows).
Elliptic has extensive experience in securing device platforms. Elliptic offers secure booting of embedded applications along with the supporting tools that are required to secure and provision secrets.
Elliptic also supports security on network interfaces by offloading IPsec and MACsec from the application to hardware. SRTP functionality is available in a fully tested SDK, ready for integration into your RTP stack.
A highly programmable and unique Security Protocol Accelerator specifically designed to efficiently process data for high capacity wireless and network applications. The engine is perfectly suited for applications that deal with multiple active connections and significant traffic load on different contexts, such as 4G LTE-Advanced wireless cellular base stations and femtocells.