X-CUBE-PQC

量産中
Design Win

STM32 Post Quantum Cryptographic firmware library software expansion for STM32Cube

ソフトウェア入手 ソフトウェア入手 データブリーフのダウンロード

製品概要

概要

With the advent of quantum computers, traditional asymmetric cryptographic algorithms such as RSA, ECC, DH, ECDH, and ECDHE become vulnerable. In response, NIST has selected a new set of algorithms designed to be resistant to quantum computing attacks.

The STM32 post-quantum cryptographic library package (X-CUBE-PQC) includes all the major security algorithms for encryption, hashing, message authentication, and digital signing. This enables developers to satisfy application requirements for any combination of data integrity, confidentiality, identification/authentication, and nonrepudiation. The library includes the PQC Leighton-Micali signature (LMS) verification method, which is used mainly for secure boot code authentication.

The library includes firmware functions for the STM32H563ZI microcontroller, based on the Arm® Cortex®‑M33 processor, and all cryptographic functions of STMicroelectronics X-CUBE-CRYPTOLIB. For more details, refer to the STM32 cryptographic library dedicated pages of the STM32 MCU wiki at wiki.st.com/stm32mcu.

Most of the widely used algorithms, except LMS, are certified according to the NIST cryptographic algorithm validation program (CAVP), helping customers to prove quickly and cost-effectively the security of their new products.

Full details are available online at the NIST CSRC algorithm validation lists website, selecting the CAVP web page.

This package contains an example of LMS signature verification using the STM32 cryptographic accelerator. To benefit from all other cryptographic examples, refer to the X-CUBE-CRYPTOLIB Expansion Package.

  • 特徴

    • X-CUBE-CRYPTOLIB security algorithms
      • Cipher encryption and decryption
      • Digest generation
      • Message authentication code (MAC) generation
      • Elliptic curves based on key generation, signature, and verification
      • Elliptic curves Diffie-Hellman
      • RSA signature, verification, encryption, and decryption
      • Deterministic random bit generator (DRGB)
    • PQC public key cryptography
      • Stateful hash-based signatures (HBS):
        • LMS digital signature verification

ソフトウェア入手

A free-form description of a component.Software VersionProduct supplier(s)ECCNs are five character alpha-numeric designations used on the Commerce Control List to identify dual-use items for export control purposes.ECCNs are five character alpha-numeric designations used on the Commerce Control List to identify dual-use items for export control purposes.