Hardware-based security for high-level protection.
Transport Layer Security, TLS, is nowadays used for protecting web browsing, email, messaging, voice over IP, industrial automation systems, etc. As an example, TLS is essentially the "S" in HTTPS in secure web browsing.
When a TLS connection is opened, a handshake protocol authenticates the server (and optionally the client) and derives shared secret keys. These keys are then used to protect further communication so that it remains private from eavesdroppers as well as protected from any accidental or intentional manipulation. The Transport Layer Security protocol is based on a combination of both symmetric and asymmetric cryptography — including cryptographic hash functions — and digital certificates.
The latest and most secure version of Transport Layer Security is TLS 1.3 which was released in 2018 and standardized in RFC 8446, including significant improvements to both security and speed compared to its predecessor TLS 1.2. A hardware-based TLS 1.3 implementation enables high-level security in mission-critical industries, such as industrial automation; example applications are distributed and remote control, edge computing, and secure industrial communications.
The main design principle in Xiphera’s TLS 1.3 client-side IP Core is to perform cryptographic computations and key management entirely in hardware. This enables complete independence from software for security-critical operations.
The TLS 1.3 IP Core is optimised for small silicon area, which makes it ideal for high-volume applications. The ability to customise the algorithms in use allows for a future-proof roadmap for Post-Quantum Cryptography (PQC). In certain cases, TLS 1.3 IP core can also be retrofitted to existing FPGA-based solutions.
August 5 2020 | Product news & updates
Xiphera Ltd © 2023