Overview#
Introduction#
This module lists all the hardware accelerator implemented Crypto algorithms.
Crypto Operations#
AES Algorithm which includes ECB, CBC, CTR modes
Key Agreement Algorithm ECDH
Digital Signature Algorithm ECDSA
AEAD Algorithms which include CCM, GCM, ChachaPoly
Secure Hash Algorithm SHA which include SHA1, SHA224, SHA256, SHA384, SHA512 modes
True Random Number Generator
Attestation token generation
Message Authenticated Code Algorithm HMAC
PUF utilizes unique hardware characteristics for secure key generation and management.