The MW_AES core performs the digital baseband function that can be used to protect electronic data…
The MW_DAB modulator core performs the digital baseband function for the transmission side…
Our specialized and skilled FPGA/SoC team can take responsibility for a complete design…
We are experienced provider of high-quality, silicon-proven IP core solutions for FPGA…
We have expertises in DSP modeling and development, specializing in architecture and…
We provide board and system-level RF design services to develop and build high-quality…
Mindway SRL offers System, Custom Electronic Design and Circuit Board Design Services..
.We specialize in new product development and R&D, addressing the most challenging issues…
We support our customers at every stage of the Functional Safety Development…
The MW_AES core performs the digital baseband function that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext, decrypting the ciphertext converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. AES is based on a design principle known as a substitution-permutation network, combination of both substitution and permutation, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. (Rijndael was designed to handle additional block sizes and key lengths, but the functionality was not adopted in AES.) Symmetric or secret-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must know and use the same secret key. All key lengths are deemed sufficient to protect classified information up to the “Secret” level with “Top Secret” information requiring either 192 or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys; a round consists of several processing steps that include substitution, transposition and mixing of the input plaintext and transform it into the final output of ciphertext. Key length can be changed frame by frame independently. The core can be used for encryption side, but also for decryption side.
Family | Device | Slices | SliceReg | LUTs | DSP48E1 | BRAM | Speed(MHz) |
---|---|---|---|---|---|---|---|
Artix®-7 | XC7A200T | 1398 | 872 | 5179 | 0 | 0 | 100 |
Zynq | Z-7020 | 1398 | 872 | 5179 | 0 | 0 | 100 |
The core, delivered as is, is warranted against defects for two years from the date of purchase. Sixty days of phone and email technical support are included, starting from the delivery date.
Verification
The core has been verified through extensive simulation and physical implementation with Vivado® Design Suite on Xilinx Artix™ 7 and Zynq-7000 technology.
Deliverables
The following deliverables are available:
Optional deliverables:
Related products