Software Solutions
Cryptographic Library
- AES Software Implementation
- RSA Software Implementation
- ECC Software Implementation
- Hash Software Implementation
- MAC Software Implementation
Necessary algorithms for these applications and optional support or joint development
- Secure Boot
- AES
- HMAC or RSA or ECC
- Full Disk Encryption
- AES-XTS
- AES
- HMAC
Deliverables for each algorithm
- Technical Specifications
- Library
- API documentation (Doxygen)
- Test plan (test vectors definition)
- Functional test report
Countermeasures
- Protection against timing attacks, including cache attacks
- Protection against Row Hammer attacks
Optionally
- Protection against embedded system attacks
- Hardware TRNG, for key generation, IV generation