A newer version of this document is available. Customers should click here to go to the newest version.
4.1. Installing and Licensing Intel® FPGA IP Cores
4.2. Specifying the IP Core Parameters and Options
4.3. Generated File Structure
4.4. Symmetric Cryptographic IP Core Flow
4.5. Dynamically Disabling SM4 Capability
4.6. Error Handling
4.7. Error Reporting
4.8. Resetting the IP Core
4.9. Channel Definition and Allocation
4.10. Byte Ordering
4.11. AXI-ST Single Packet Mode
4.12. AXI-ST Multiple Packet Mode
7.1. Cryptographic Primary Control Register
7.2. Cryptographic Secondary Control Register
7.3. Cryptographic Primary Status Register
7.4. Cryptographic Error Status Register
7.5. Cryptographic Error Control Register
7.6. Cryptographic Packet Error Control 1 Register
7.7. Cryptographic Packet Error Control 2 Register
7.8. Cryptographic Error Code Control 1 Register
7.9. Cryptographic Error Code Control 2 Register
7.10. Cryptographic Error Code Internal Control Register
7.11. Cryptographic Internal Error Control Register
7.12. Cryptographic First Error Log Register
7.13. Cryptographic Packet Error Log 1 Register
7.14. Cryptographic Packet Error Log 2 Register
7.15. Cryptographic Internal Error Log Register
7.16. Cryptographic Wall Clock LSB Register
7.17. Cryptographic Wall Clock MSB Register
7.18. Ternary Control Register
6. Cryptographic IP Data Profiles
The cryptographic IP data profiles allow you to choose a specific algorithm for your application.
All profiles utilize the same AXI-ST interface. Each profile enables you to process data using specific cryptographic settings. You select a profile by setting the p0_app_ip_tx_tuser.pattern[3:0] signal to the desired profile pattern.
The Symmetric Cryptographic IP core supports the following unique profiles.
- MACsec: MAC Security profile
- IPsec: IP Security profile
- Generic GCM profile
- Generic XTS profile
- Interleaved profile
For all profiles, if you choose to preload the keys, you must wait for four AXI-ST clock cycles before sending data to be encrypted or decrypted. If you are streaming the keys, every key should be immediately followed by data.
Each profile is optimized for specific usage. The following sections describe the profiles and their configurations.