Give us the instruction set and architectural features of your microcontroller with or without crypto-processor and we do the rest.
We have more than 16 years of experience in developing and delivering cycle-accurate optimized cryptographic libraries. Our software can be declined on a variety of hardware platforms (smartcards, USB tokens, HSMs, Terminals, Smart Phones) and typically supports the following functions:
Our humanly developed low-level APIs rely on finely tuned arithmetic algorithms designed to best suit the given microarchitecture and its hardware computational features at the assembly level. Our libraries are faster by orders of magnitude than C code compiled with general-purpose compilers. Challenge us and compare.
Hardware Design. You are a chip manufacturer or design house and want the best crypto-processing architecture? We synchronize with you and provide our world-class experience in cryptographic algorithms to identify innovative and cost-effective (silicon area, number of gates, power consumption, critical paths, etc.) design solutions to support the native operations required in crypto-enabled security products. Our stand-alone, simulation-based benchmarking tools allow us to accurately evaluate the performances of optimized cryptographic software on your target architecture before the first sample chips or emulators are even made available.
Security against Physical Attacks. Our cryptographic APIs are guaranteed to embed the most efficient countermeasures against physical attacks and successfully pass in-lab security evaluations (FIPS 140-2, CC EAL, CAST, EMVco, etc.). We implement customized countermeasures that efficiently thwart all kinds of power and electromagnetic attacks (SPA/SEMA, DPA/DEMA, HO-DPA, template attacks, etc.), fault-injection attacks (FA, DFA, etc.), or cache and timing attacks. We evaluate the latest cryptanalytic attacks based on side-channel information leakage and fault injection and integrate cost-effective software countermeasures in our libraries, so you don’t have to worry about physical security anymore: our certification-ready APIs can be used in a transparent way by your high-level application.
Our Expertise. Accredited evaluation labs keep an eye on the latest advances in side-channel analysis and fault-based attacks, attend all major security related scientific conferences and workshops (CHES, FDTC, JHAS, ICCC, eSmart, etc.) and collaborate with academic partners to sharpen their attacking skills. So do we. CryptoExperts was co-founded by 3 internationally recognized experts who have served as program chairs of CHES. Our R&D staff of 7 PhDs totalizes more than 60 patents and 50 scientific publications in the field of embedded cryptography and maintains beyond-state-of-the-art knowledge to secure smart card products. Let word-class experts develop or evaluate your embedded cryptographic libraries.