• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Cryptolib: The Most Complex Cryptographic Algorithms Become Modular, Certified, and Easy by STMicroelectronics


By VARINDIA - 2017-04-21
Cryptolib: The Most Complex Cryptographic Algorithms Become Modular, Certified, and Easy  by STMicroelectronics

IoT is now nicknamed the “Internet of Threats”, cars get more easily hacked than computers, and improperly encrypting users’ data could bankrupt a company. The world is moving toward more and better encryption methods, because they are necessary to tackle the new challenges users face. ST brings many hardware optimizations to its platform to ensure that encryption and decryption operations do not result in a performance penalty. Whether we are talking about Telemaco, mobile payments, small connected devices, or powerful MCUs, such as the STM32H7, you will find a ST component that has a “crypto core” of some sort. However, this is only one side of the coin. The other side is Cryptolib.

 

Cryptolib : Cryptographic Modular Middleware

 

STM32 CRYPTO LIBRARY ARCHITECTURE IN A FULL PROJECT (CLICK TO ENLARGE)

 

A great crypto core needs something to optimize. Big companies can hire vast teams of experts to implement complex cryptographic methods, or they can simply use X-CUBE-CRYPTOLIB, ST’s firmware library designed to integrate an enormous array of cryptographic methods optimized for its components. It even includes template projects for popular toolchains, such as Keil MDK-ARM, IAR®EWARM (IAR Embedded Workbench®), or GCC-based IDEs. Starting from scratch is now a thing of the past.

 

In its most basic form, Cryptolib is a middleware that sits under the application, and above the hardware. This structure allows it to be compatible with all of the STM32 MCUs. As a result, when one prototype requires another microcontroller, whether to obtain more computational power, or lower the energy footprint, Cryptolib contains all the necessary firmware to switch hardware platforms without having to rewrite the application. The middleware simply takes the software code and adapts its execution during compilation. Furthermore, because Cryptolib is a modular library, it is possible to easily add algorithms, or customize them to change memory management, or execution speed, making the package future-proof.

A Method for Every Need

 

The number of algorithms offered by Cryptolib is huge, and will cover the needs of very nearly all projects. For instance, AES–256 is a symmetric-key algorithm, which means there’s only one key to cipher and decipher. Used by governments, it is extremely reliable and fast. It can encrypt a text in a way that is self-decipherable, as long as the user has the right password.

 

SHA–512 (Secure Hash Algorithm) generates a 512-bit hash that can protect passwords, or digital signatures, because it is a one-way function, which means there is no way to decrypt it back. In other words, a hash cannot pass through a function to convert it into plain text. As a result, the user will have to enter what the plain text is supposed to be, the algorithm will encrypt it, and then compare the obtained hash with the one in the system. If they match, it means the plain text is correct. Therefore, the only way to theoretically crack a hash is to use a brute-force attack, meaning trying every single combination possible.

 

IN CASES OF HACKING, ENCRYPTED DATA CAN PROTECT YOUR CUSTOMERS

 

Cryptolib also facilitates the use of the Elliptic Curve Digital Signature Algorithm (ECDSA). An elliptic curve cryptographic (ECC) approach is one of the most powerful methods for encrypting data, because it uses a mathematical problem that can’t yet be solved with an algorithm. Hence, it is increasingly popular on the web, data centers, and government agencies, to prevent eavesdroppers from deciphering an intercepted message. It offers an even higher level of security than other public-key cryptographic systems, like RSA, but at a fraction of the size. For instance, the equivalent 256-bit ECC public key would have to be 3072 bits if one was using RSA.

Certified!

Last July, Cryptolib’s implementation of the three methods mentioned above was certified by the Cryptographic Algorithm Validation Program (CAVP). Used in America and Canada, it validates the implementation of cryptographic algorithms according to the standards established by the Federal Information Processing Standard (FIPS), and National Institute of Standards and Technology (NIST). Hence, because Cryptolib is now accredited, any product that relies on this middleware can be directly submitted to the FIPS for security testing, because ST already took care of the validation process. Whether one is making a point of sale terminal, a smartphone with a fingerprint reader, or the simplest access point, Cryptolib offers a simple way to implement algorithms that have gone through the most stringent certifications, so you can use them with total peace of mind, and know that going from prototype to mass production will be a lot simpler.

 

It is possible to obtain Cryptolib by asking for it on ST’s website. It is available for free under ST’s Software License Agreement, and a request usually takes 48 hours to validate.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.