Cryptographic Acceleration#

Cryptographic processing involves generating, verifying, and certifying various public and private keys. This kind of processing can take a toll on the performance and throughput of an embedded system.

TI’s ARM based processors are equipped with hardware-based accelerators that speed up the encoding/decoding processes tremendously. Software-based acceleration is also available, but this approach is not as inherently secure as hardware-based cryptographic acceleration.

In TI’s ARM based processors, the cryptographic accelerator is used for encryption (AES), hashing, and asymmetric accelaration (RSA/ECC).

Hardware Security Module Support#

Parameter

Functionality

Confidentiality

AES 128, 192, 256

Authentication

CMAC (symmetric key based), Asymmetric key based certificate signature verification algorithm (For ex. Up to RSA 4K, ECDSA supported)

Hardware acceleration

AES, TRNG, PRNG, SHA-256/512/HMAC, ECC, RSA-2K, RSA-4K (using PKA engine)