SPRUJ79 November 2024 F29H850TU , F29H859TU-Q1
The Hardware Security Manager (HSM) includes several hardware accelerators to enable fast execution of key cryptographic algorithms. These engines are described in Table 44-1.
| Engine | Algorithms Supported |
|---|---|
| AES (Advanced Encryption Standard) | Symmetric Algorithms: AES-128, AES-192, AES-256 Cipher modes: ECB, CTR, CBC, CFB, OFB, CCM, GCM Authentication: CBC-MAC |
| SM4 | Symmetric Algorithms: SM4 |
| PKE (Public Key Engine) | High-performance PKE for large-vector math/modulus operation Ciphers: RSA-2048, RSA-3092, RSA-4096, ECC (Curve25519, X25519, SecP256r1, secP256k1, secP384r1, secP384k1, Brain Pool, and more), SM2 Supports cryptographic operations: ECDSA, EdDSA, ECDH, EdDH, SM2DSA Side-channel protection (DPA, FIA) |
| SHA | Hash Algorithms: SHA-256, SHA-384, SHA-512 Keyed hashing: HMAC-SHA256, HMAC-SHA512 |
| SM3 | Hash Algorithms: SM3 (256 bits, 384 bits, 512 bits) |
| TRNG | True random number generator Deterministic random bit generator (DRBG) |