• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Thursday, April 30, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Cavium's Latest Security Processors Offer SHA-2, AES-GCM and KASUMI algorithms

Cavium's Latest Security Processors Offer SHA-2, AES-GCM and KASUMI algorithms

September 10, 2006
in Uncategorized
A A

Cavium Networks introduced its NITROX PX Security Processor family with 8 new products targeted at IP Security (IPsec), Secure Sockets Layer (SSL) and Wireless security applications.

The NITROX PX family provides hardware acceleration for SHA-2, AES-GCM and KASUMI algorithms, and a PCI- Express interface in a single chip. The processors feature the GigaCipher v2 cores with increased code store and enhanced hardware queuing, which enables richer protocol processing and multi-protocol performance. All products are fully software compatible with Cavium Networks NITROX family of security processors and are offered with either a PCI-X 64/133 interface that is NITROX family pin-compatible or PCI- Express x4 interface.

The NITROX PX Family delivers scalable symmetric encryption performance, ranging from 500 Mbps to 2.5 Gbps, and asymmetric performance from 4000 to 17,000 RSA operations per second.

Cavium said existing secure networking equipment is being upgraded to incorporate new security algorithms that will be deployed in the market by 2008. These new algorithms include SHA-2 and AES-GCM. SHA-2, which consists of the SHA-256, SHA-384 and SHA-512 algorithms, offers increased and robust security protection over the currently deployed SHA-1 algorithm for hashing and digital signature applications. Rapid adoption of SHA-2 is being encouraged by the US National Institute of Standards and Technology (NIST). AES-GCM is expected to replace the existing 3DES and AES-CTR encryption algorithms used for IPsec VPN applications as it provides an efficient implementation for confidentiality and data origin authenticity. http://www.cavium.com

Tags: AllSilicon
ShareTweetShare
Previous Post

Broadcom Extends Stock Option Revisions to June 1998, Sees Additional Charges

Next Post

Spirent Introduces New IMS Testing Product

Staff

Staff

Related Posts

Montage Technology Samples PCIe 6.x/CXL 3.x Retimer Chips
Data Centers

Montage Technology Samples PCIe 6.x/CXL 3.x Retimer Chips

January 22, 2025
Intel marks first EUV light at Fab 34 in Ireland
Semiconductors

Intel marks first EUV light at Fab 34 in Ireland

December 30, 2022
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
Next Post

Ixia Scales its Subscriber Emulation for Carrier Class Networks

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version