Noesis Technologies offers a wide range of high performance security solutions that cover the most demanding application requirements in terms of power, throughput rate and silicon resources.
The Advanced Encryption Standard (AES) has been ratified in November 2001 by the National Institute of Standards and Technology (NIST) as the new encryption standard (FIPS PUB 197) to replace the existing, aging and vulnerable Data Encryption Standard (DES). An algorithm called Rinjdael has been finally selected for AES among a number of other candidates, after successfully meeting a set of criteria including not only security but performance and implementation feasibility in a variety of applications. Noesis Technologies has been involved in the development of cryptographic solutions for telecom and defense sector since 2000 and our class leading solutions have been silicon proven in multiple applications. We offer a wide range of silicon proven AES cores with different performance & silicon area combinations that provide the optimum implementation for your application requirements. Due to our unique Galois Field Multiplier architectural implementation, the structural datapath element of all AES cryptographic engines, and our efficient algorithm mapping techniques Noesis is proud to offer optimum AES IP core solutions exhibiting the best performance-silicon area ratio available in the industry.
RC4, also known as ARC4, is a cipher that supports Secure Sockets Layer for internet traffic protection. It has been in use for many years, proved as a highly secure cipher. Noesis Technologies ntRC4 is a silicon proven IP core solution that implements the ARC4 stream cipher/decipher algorithm. It supports variable length keys and features a high speed operation since it processes one data byte per 3 clock cycles.
An n-bit hash is a map from arbitrary length messages to n-bit hash values. An n-bit cryptographic hash is an n-bit hash which is one-way and collision-resistant. Such functions are important cryptographic primitives used for such things as digital signatures and password protection. Current popular hashes produce hash values of length n = 128 (MD4 and MD5) and n = 160 (SHA-1), and therefore can provide no more than 64 or 80 bits of security, respectively, against collision attacks. Since the goal of the new Advanced Encryption Standard (AES) is to offer, at its three cryptovariable sizes, 128, 192, and 256 bits of security, there is a need for companion hash algorithms which provide similar levels of enhanced security. ntSHA256 IP Core implements SHA-256, or Secure Hash Algorithm-256 which is one of the latest hash functions standardized by the U.S. Federal Government. It is a 256-bit hash and is meant to provide 128 bits of security against collision attacks. The implementation is very low on latency, high speed with a simple interface for easy integration in SoC applications.
Encryption/Decryption IP Cores