SPRSP93 November 2024 F29H850TU , F29H859TU-Q1
ADVANCE INFORMATION
The Hardware Security Manager (HSM) includes several hardware accelerators to enable fast execution of key cryptographic algorithms. These engines are described in Table 7-43. For a hardware description and usage instructions for the cryptographic accelerator engines and the Data Transform and Hash Engine (DTHE), see the Cryptographic Hardware Accelerators User's Guide.
Engine | Algorithms Supported |
---|---|
AES (Advanced Encryption Standard) | Symmetric Algorithms: AES-128, AES-192, AES-256 Cipher modes: ECB, CTR, CBC, CFB, OFB, CCM, GCM Authentication: CBC-MAC |
SM4 | Symmetric Algorithms: SM4 |
PKE (Public Key Engine) | High-performance PKE for large-vector math/modulus operation Ciphers: RSA-2048, RSA-3092, RSA-4096, ECC (Curve25519, X25519, SecP256r1, secP256k1, secP384r1, secP384k1, Brain Pool, and more), SM2 Supports cryptographic operations: ECDSA, EdDSA, ECDH, EdDH, SM2DSA Side-channel protection (DPA, FIA) |
SHA | Hash Algorithms: SHA-256, SHA-384, SHA-512 Keyed hashing: HMAC-SHA256, HMAC-SHA512 |
SM3 | Hash Algorithms: SM3 (256 bits, 384 bits, 512 bits) |
TRNG | True random number generator Deterministic random bit generator (DRBG) |