Home > Security IP > Software Protocols
Rambus secure software toolkits and libraries feature a complete range of capabilities that secure communications, as well as offer cryptographic services that are FIPS-certified or protected against side channel attacks. The Security Protocol Toolkits provide high interoperability and portability for use in security gateways, cloud deployments, smartphones and IoT devices. They include full featured implementations of key exchange protocols, as well as the datapath with all required cipher libraries.
Solution | Description |
---|---|
Quantum Safe IPsec Toolkit | Quantum Safe complete IPsec implementation. Fast, scalable and fully compliant IPsec implementation. Used in cloud and virtual deployments, high traffic gateways, and embedded devices. |
Classic IPsec Toolkit | A scalable and fully compliant IPsec implementation. Used in cloud and virtual deployments, high traffic VPN gateways, and embedded devices. |
FIPS Cryptographic Libraries | FIPS 140-2 and FIPS 140-3 validated cryptographic libraries offering up-to-date implementations of all algorithms needed by IPsec or TLS. |
Crypto Engine & Crypto Provider | Robust implementations of the OpenSSL Engine and Provider APIs offering FIPS validated cryptography with the validated libraries above. |
Quantum Safe Library | Quantum Safe Cryptographic library offering future-proof cryptography by providing new quantum resistant algorithms and classic algorithms in a single package. |
Solution | Description |
---|---|
Secure Boot | Provides tools for integrating security into an embedded device’s system boot sequence. Uses strong cryptography to protect the boot process of SoCs and application processors. |
SHSlib | Stateful hash-based signatures library providing a bare-metal implementation for LMS and XMSS schemes. |
The MACsec, IPsec and SSL/TLS/DTLS protocols are the primary means of securing data in motion (communicated between connected devices). These protocols can be anchored in hardware or implemented in software as part of an end-to-end security architecture. This white paper provides fundamental information on each of these protocols including their interrelationships and use cases.