Cryptographic Acceleration#
Cryptographic processing involves generating, verifying, and certifying various public and private keys. This kind of processing can take a toll on the performance and throughput of an embedded system.
TI’s ARM based processors are equipped with hardware-based accelerators that speed up the encoding/decoding processes tremendously. Software-based acceleration is also available, but this approach is not as inherently secure as hardware-based cryptographic acceleration.
In TI’s ARM based processors, the cryptographic accelerator is used for encryption (AES), hashing, and asymmetric accelaration (RSA/ECC).
Parameter |
Functionality |
|---|---|
Confidentiality |
AES 128, 192, 256 |
Authentication |
CMAC (symmetric key based), Asymmetric key based certificate signature verification algorithm (For ex. Up to RSA 4K, ECDSA supported) |
Hardware acceleration |
AES, TRNG, PRNG, SHA-256/512/HMAC, ECC, RSA-2K, RSA-4K (using PKA engine) |