Intrinsic ID Crypto Software

In order to build full authentication and encryption/decryption solutions, one needs cryptographic building blocks to authenticate messages, devices, and keep information private. Our crypto software libraries are built to work seamlessly together with QUIDDIKEY and or BROADKEY and provide authentication and encryption/decryption functionality. They have been developed according to state of the art design rules and offer various optimizations in terms of area and speed.

iRNG random number generator

  • SRAM-PUF based truly random seed value
  • Deterministic Random Bit Generator (DRBG)
  • Standard available in all process nodes
  • FIPS 140-3 compliant
  • Code size: 8 kBytes (ARM M3)
  • Throughput: 0.88 Mbit/s (100MHz clock)

SHA-256 – Secure Hash Algorithm

  • Key size: 256 bit
  • Block size: 512 bit
  • FIPS PUB 180-2 compliant
  • Code size: 1 kByte
  • Throughput: 7.9 Mbit/s (100 MHz clock)

AES-256 encryption/decryption IP

  • Key size: 256 bit
  • Available mode: ECB
  • Code size: 2 kByte
  • Throughput: Encrypt: 1 Mbit/s, Decrypt: 0.5 Mbit/s (100 MHz clock)

HMAC-SHA-256 – Message Authentication

  • Key size: 256 bit
  • Block size: 512 bit
  • FIPS PUB 180-2 compliant
  • Code size: 1.2 kByte
  • Throughput: 7.6 Mbit/s (100 MHz clock)