|
Overview
To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain dedicated hardware accelerators that offload challenging tasks, such as network protocol computation, AI and deep learning, and – most importantly – security. For a security performance that matches the speed of the new SoCs we are offering a scalable hardware IP block that handles encryption at speeds from a few Gbps to over 100Gbps, depending on the needs.
The Network Security Crypto Accelerator is used to accelerate/offload MACsec, IPsec, VPN, TLS/SSL, disk encryption, or any other custom application, requiring symmetric cryptography algorithms. It can also be combined with the eSecure Root of Trust module to form a complete secure enclave, that will handle the keys without exposing them to the software, which makes it suited for even the most regulated and security-sensitive industries.
Direct Memory Access (DMA)
Native speeds of hardware cores may remain largely theoretical if the host processor is not able to deliver data to the crypto module and process the results at the same speed. That is why this Network Security Crypto Accelerator includes a Direct Memory Access (DMA) interface to the host memory space. Here, the operations are efficiently offloaded via a built-in scatter-gather DMA optimized to handle networks packets of any size.
The platform integrates your desired selection of our cryptographic IP cores, a DMA and software layers providing a complete solution.
The Network Security Crypto Accelerator is used to accelerate/offload MACsec, IPsec, VPN, TLS/SSL, disk encryption, or any other custom application, requiring symmetric cryptography algorithms. It can also be combined with the eSecure Root of Trust module to form a complete secure enclave, that will handle the keys without exposing them to the software, which makes it suited for even the most regulated and security-sensitive industries.
Direct Memory Access (DMA)
Native speeds of hardware cores may remain largely theoretical if the host processor is not able to deliver data to the crypto module and process the results at the same speed. That is why this Network Security Crypto Accelerator includes a Direct Memory Access (DMA) interface to the host memory space. Here, the operations are efficiently offloaded via a built-in scatter-gather DMA optimized to handle networks packets of any size.
The platform integrates your desired selection of our cryptographic IP cores, a DMA and software layers providing a complete solution.
Please sign in to view full IP description :
Tech Specs
Part Number | SCZ_SP_BA453 |
Short Description | Secure-IC's Securyzr(TM) Network Security Crypto Accelerator |
Provider |