The following cryptographic hardware features are supported through Security Builder BSP for the platforms listed below:
Hardware Features Supported |
Intel Wireless |
FreeScale |
Eracom |
nCipher |
Symmetric Encryption Algorithms | AES |
AES |
DES, 3DES, AES |
DES, 3DES, AES |
Hash Functions | SHA-1, |
SHA-1, |
SHA-1, MD5, |
SHA-1, MD5 |
Digital Signatures | RSA |
ECDSA, RSA |
RSA, DSA |
RSA, DSA |
Key Agreement/Key Transport | DH |
DH, ECDH, |
RSA, DH |
RSA, DH |
Random Number Generation | X |
X |
X |
X |
Hardware Key Management | ||||
Key Generation | X |
- |
X |
X |
Secure Key Storage | X |
- |
- |
- |
Monotonic Counter | X |
- |
- |
- |
Supported Operating Systems | Montavista |
Wind River VxWorks |
AIX, HP-UX, |
Linux |
Hardware Supported via PKCA#11 | - |
- |
ProtectServer |
nFast, nForce, |
FIPS 140-1/2 Level 3 |
- |
- |
X |
X |
*Other RTOS available upon request from Certicom
**Other OS available upon request from Certicom
Security Builder® Crypto™-C can be licensed separately to provide additional software cryptographic functionality.
FIPS 140-2 is required for sale of products implementing cryptography to the Federal Government. Because of the high level of security ensured by FIPS, the financial and healthcare industries are also starting to mandate FIPS 140-2 to secure their transactions.
Other libraries can and will be developed for additional market leading mobile processors that have onboard hardware cryptographic providers. Please check with Certicom for availability.