This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

66AK2H12: The type of encryption algorithm on processors

Part Number: 66AK2H12

Hi

Our customer need the information about the type of encryption algorithm which are implemented in some processors which I put the list on above "Notes" box.

They need this information for China Export Control Law. 

Thanks and Best regards,

HaTa.

  • HaTa,

    I can respond to the question relating to the DSP parts. I will let the Sitara and Jacinto Processors team respond for other devices on your list.

    Please refer to following table for responses to OMAPL13x, K2H and K2E:

    There are no HW accelerators on OMAPL13x. HW cyrpto across all K2 devices is the same except K2G also provides ECDSA PKA accelerator.

    For C66x device, there is no high secure variant or support for secure boot but the devices have the following HW accelerators:

    AES, SHA-1, SHA-2, 3DES ,SNOW 3G, HMAC, MD5 (For complete list refer to https://www.ti.com/lit/ug/sprugy6b/sprugy6b.pdf?ts=1608245920064 )

    Hope this helps.

    Regards,

    Rahul

  • Hi Rahul

    Thanks for listing the security features for DSP products.

    How do you think they match the conditions for both the blue and yellow areas below?

    "

    Includes a symmetric encryption algorithm with a cryptographic key length of 64 bits or more, an asymmetric encryption algorithm based on prime factorization with a cryptographic key length of 768 bits or more, or an asymmetric encryption algorithm based on an elliptical curve with a cryptographic key length of 128 bits or more, and symmetric encryption. The encryption / decryption speed of the algorithm is 10 Gbps or more, or the signing speed of the asymmetric encryption algorithm is 50,000 times / second or more

    "

    Thanks and Best regards,

    HaTa.