Software

Cryptographic Library

  • AES Software Implementation
  • RSA Software Implementation
  • ECC Software Implementation
  • Hash Software Implementation
  • MAC Software Implementation

Necessary algorithms for these applications and optional support or joint development

  • Secure Boot
  • AES
  • HMAC or RSA or ECC
  • Full Disk Encryption
  • AES-XTS
  • AES
  • HMAC

Deliverables for each algorithm

  • Technical Specifications
  • Library
  • API documentation (Doxygen)
  • Test plan (test vectors definition)
  • Functional test report

Countermeasures

  • Protection against timing attacks, including cache attacks
  • Protection against Row Hammer attacks

Optionally

  • Protection against embedded system attacks
  • Hardware TRNG, for key generation, IV generation