Overview#

Introduction#

This module lists all the hardware accelerator implemented Crypto algorithms.

Crypto Operations#

  • AES Algorithm which includes ECB, CBC, CTR modes

  • Key Agreement Algorithm ECDH

  • Digital Signature Algorithm ECDSA

  • AEAD Algorithms which include CCM, GCM, ChachaPoly

  • Secure Hash Algorithm SHA which include SHA1, SHA224, SHA256, SHA384, SHA512 modes

  • True Random Number Generator

  • Attestation token generation

  • Message Authenticated Code Algorithm HMAC

  • PUF utilizes unique hardware characteristics for secure key generation and management.