ECDH/ECDSA: NIST Curves

Xiphera’s compact IP cores implement ECDH and ECDSA on NIST prime curves, and the high-speed ECC Accelerator reaches over thousand operations per second.

Xiphera’s NIST Curves for ECDH/ECDSA provide cutting-edge security solutions designed for robust public-key operations, including encryption, digital signatures, and key exchanges. These solutions are optimised for both performance and resource efficiency in both FPGA and ASIC implementations, offering versatile functionality across various cryptographic protocols.

Versatile solutions for secure environments in…

Secure data communications

Digital signature verification

Key exchange protocols

High-performance cryptographic operations

Key features

  • Optimised resource requirements
  • High throughput
  • Compliant with FIPS 186-5 and SP 800-56A
  • Supports NIST P curves
  • Secure architecture with side-channel protections
  • Fully RTL-based with no CPU or software components
  • Efficient and optimised architecture
  • Easy system integration
  • Vendor agnostic FPGA/ASIC implementation

Technical specifications

The IP cores implement ECDH and ECDSA, and the ECC Accelerator demonstrates a capability of executing over a thousand operations per second when deployed on a modern FPGA or ASIC.

Product code: XIP4200H

  • >1K ops/sec for key generation on NIST P-256
  • ~36 kLUTs
  • Supports all NIST P Curves
  • Protections against multi-trace side-channel attacks

Product code: XIP41X3C

  • Several 100s key agreements or signatures/sec
  • ~1.12 kLUTs

Find more technical details, including FPGA resources & peak performance as well as ordering instructions, from the product briefs. 

Register for the ASIC-specific product brief to learn more about the technical details and performance numbers for ASIC applications.

Quantum-resilient secure boot

Correct use of agile, hardware-based cryptography can secure the boot process of your computing platform. Xiphera’s quantum-resilient nQrux® Secure Boot ensures confidentiality, integrity, and authenticity of the power-up process even against quantum attacks.

Xiphera’s nQrux family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures.