SPRSP93 November 2024 F29H850TU , F29H859TU-Q1
ADVANCE INFORMATION
Refer to the PDF data sheet for device specific package drawings
The Hardware Security Manager (HSM) includes several hardware accelerators to enable fast execution of key cryptographic algorithms. These engines are described in Table 7-43. For a hardware description and usage instructions for the cryptographic accelerator engines and the Data Transform and Hash Engine (DTHE), see the Cryptographic Hardware Accelerators User's Guide.
Engine | Algorithms Supported |
---|---|
AES (Advanced Encryption Standard) | Symmetric Algorithms: AES-128, AES-192, AES-256 Cipher modes: ECB, CTR, CBC, CFB, OFB, CCM, GCM Authentication: CBC-MAC |
SM4 | Symmetric Algorithms: SM4 |
PKE (Public Key Engine) | High-performance PKE for large-vector math/modulus operation Ciphers: RSA-2048, RSA-3092, RSA-4096, ECC (Curve25519, X25519, SecP256r1, secP256k1, secP384r1, secP384k1, Brain Pool, and more), SM2 Supports cryptographic operations: ECDSA, EdDSA, ECDH, EdDH, SM2DSA Side-channel protection (DPA, FIA) |
SHA | Hash Algorithms: SHA-256, SHA-384, SHA-512 Keyed hashing: HMAC-SHA256, HMAC-SHA512 |
SM3 | Hash Algorithms: SM3 (256 bits, 384 bits, 512 bits) |
TRNG | True random number generator Deterministic random bit generator (DRBG) |