25.2 Features
• Efficient AES core
• Encryption/decryption using 128-bit key (54 clock cycles) or 256-bit key (75 clock cycles)
• Key buffer
• Supports autonomous cipher block modes (e.g. ECB, CTR, CBC, PCBC, CFB, CBC-MAC, GMAC, CCM, CCM* and GCM)
across multiple blocks
• Accelerated SHA-1, SHA-224 and SHA-256
• Accelerated Elliptic Curve Cryptography (ECC)
• Binary and Prime fields
• Supports NIST recommended curves: P-192, P-224, P-256, K-163, K-233, B-163, and B-233
• Galois/Counter Mode (GCM)
• ALU operations on GCM GF(2^128) field
• Flexible 256-bit ALU and sequencer
• 5 general purpose 256-bit registers
• Supports ADD, SUB, MUL, shift, XOR, etc.
• Up to 20 instructions can be chained to implement various block cipher modes
• Efficient operation
• DMA request signals for data read and write
• Optional XOR Data write
• Interrupt on finished operations
• Extensive software support
• Extensive software library in Simplicity Studio
• Implements all major cryptographic algorithms: AES, SHA-1, SHA-2, and ECC
• Implements legacy algorithms: DES, 3DES, MD4, MD5, and RC4
• Hardware accelerated when possible
25.3 Usage and Programming Interface
Many security systems fail due to mistakes in the implementation. Therefore implementations should be left to experts in cryptographic
algorithms.
To solve this, the module is supported by an hardened cryptography software library and API delivered through Silicon Labs' Simplicity
Studio. The software API is a frontend for performing all supported cryptographic operations, and must be used to recieve prompt sup-
port.
EFM32JG1 Reference Manual
CRYPTO - Crypto Accelerator
silabs.com
| Smart. Connected. Energy-friendly.
Preliminary Rev. 0.6 | 818