Stealth AES Encryption IP

Pantherun, is a pioneering force in the realm of encryption technology and data protection solutions. At Pantherun, we are driven by a singular mission: to empower businesses and organizations to safeguard their most valuable asset – their data – against evolving cyber threats and security breaches.

 

Our Commitment to Data Security

In an age where data breaches and cyberattacks pose significant risks to businesses of all sizes, data security has never been more critical. Pantherun is committed to providing state-of-the-art encryption technology and data protection solutions designed to mitigate these risks and ensure the confidentiality, integrity, and availability of sensitive information.

 

Expertise in Encryption Technology

With a team of highly skilled engineers and security experts, Pantherun brings decades of experience in encryption technology and cybersecurity to the table. From symmetric and asymmetric encryption algorithms to advanced cryptographic protocols, we possess the knowledge and expertise to develop robust, scalable, and future-proof encryption solutions tailored to our clients’specific needs.

 

Our Stealth AES Encryption IP provides advanced encryption capabilities to secure data transmission and storage in various applications, including IoT devices, edge computing systems, cloud platforms, and communication networks. Built on the Advanced Encryption Standard (AES), our IP offers robust encryption algorithms to safeguard sensitive information against unauthorized access and data breaches.

Variant

Product Highlights

  • Stealth AES Encryption Standard: Implements the AES algorithm specified by the National Institute of Standards and Technology (NIST) for encryption and decryption.
  • Multiple Key Length Support: Supports key lengths of 128, 192, and 256 bits, providing flexibility to meet different security requirements.
  • High Performance: Optimized for high-speed encryption and decryption operations, enabling efficient processing of large volumes of data.
  • Low Power Consumption: Designed for low-power applications, minimizing energy consumption while maintaining high-performance encryption capabilities.
  • Small Footprint: Compact design enables integration into resource-constrained devices and systems without compromising performance or security.
  • Hardware Acceleration: Utilizes hardware-based encryption engines to accelerate cryptographic operations and offload processing from the main CPU.
  • Secure Key Management: Implements secure key storage and management mechanisms to protect encryption keys from unauthorized access or tampering.
  • Configurable Modes of Operation: Supports various modes of operation, including CTR (Counter Mode) and GCM (Galois/Counter Mode) to accommodate different encryption requirements.
  • For Silicon IP – Flexible Integration: Compatible with a wide range of processor architectures, FPGAs with ARM and RISC V core, including, but not limited to Intel-Altera, AMD-Xilinx and so on, and system-onchip (SoC) designs, facilitating easy integration into existing hardware platforms.
  • Comprehensive Documentation: Includes detailed documentation, reference designs, and integration guidelines to simplify the integration process and accelerate time-to-market.

Specification

Applications

Cameras & Image Handling

Internet of Things (IoT) Devices

Edge Computing Systems

Cloud Infrastructure

Network Security Appliances

Storage Devices

Communication Networks

Automotive Networks

Benefits

Data Security

Provides robust encryption to protect sensitive information from unauthorized access and data breaches

Performance

Delivers high-speed encryption and decryption capabilities to ensure efficient data processing

Power Efficiency

Minimizes energy consumption for battery-powered and low-power devices

Scalability

Supports multiple key lengths and configurable modes of operation to meet diverse security requirements

Integration

Easy integration into hardware platforms with comprehensive documentation and reference designs

Technical Specifications(CTR)

Encryption Algorithm

Algorithm: Advanced Encryption Standard (AES)-CTR mode

Key Lengths

128, 192, and 256 bits

LUTs used

< 4K

BRAM used

18

PL Clock

To be filled

PS Clock

To be filled

Throughput

966Mbps(TBC)

Footprint

TBD

Supported Standards

NIST FIPS 197

Technical Specifications(GCM)

Encryption Algorithm

Advanced Encryption Standard (AES)-GCM mode

Key Lengths

128, 192, and 256 bits

LUTs used

< 9K

BRAM used

23

PL Clock

To be filled

PS Clock

To be filled

Throughput

966Mbps(TBC)

Footprint

TBD

Supported Standards

NIST SP 800-38D

Certifications

Compliance with National Institute of Standards and Technology (NIST) standards for AES encryption

Ordering Information

Chip with Stealth IP

10/100/1G AES for 1 port

CIP-AES-1

Only Stealth IP

10/100/1G AES for 1 port

NIP-AES-1

Soft Stealth IP

10/100/1G AES for 1 port

SIP-AES-1