Linux crypto accelerator

Linux crypto accelerator

All crypto accelerators operate on constant time to eliminate side channel attacks. Licensed DPA countermeasures are used and all critical crypto operations are performed on internal supercapacitor power only. In just a few seconds our chip can perform over 2 million iterations of PBKDF2 SHA-512. The overall device design linux crypto accelerator FIPS 140-2 highest Level 4 security requirements.

Dedicated Graphics Processing Unit ensures that responsive user interfaces can be built and presented smoothly at 60fps. Click here to see User Interface demo. High security PIN entry allows you to unlock your device like a real vault. Terms and Conditions By subscribing to our newsletter you agree to receive email from us. The aim of our newletter service is to keep our customers and visitors updated about pre-ordering, new hardware device releases and new service offerings. Frequency The frequency of the newletter issues will be at most monthly, unless we have announcements described above.

Limited Liability We reserve the sole right to either modify or discontinue the newletter, at any time with or without notice to you. We will not be liable to you or any third party should we exercise such right. Any new features that augment or enhance the then-current services on this site shall also be subject to these Terms of Use. You’ll be able to change your subscription settings or to delete it alltogether anytime. Share our website with your followers and friends. Only this way you can really trust the CPU. Cache RAM ensures that responsive user interfaces can be built and presented smoothly at 60fps.

It has been specifically designed to prevent undetected tampering with any of its electrical components, including the entire PCB. It is covered by 8 layers of active 0. This is four times denser than the single layer mesh on ORWL secure computer. Supercapacitor based energy storage is built to last for decades, eliminating the need to replace batteries or aging rechargeable Li cells. In fact, the physical enclosure has been designed specifically to make opening it extremely hard. At this security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access. Penetration of the cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate zeroization of all plaintext CSPs.