en

PINE

PINE Image

PINE is a state-of-the-art FPGA based IP network encryption equipment supporting post-quantum NIST FIPS-203 ML-KEM standard compliant key generation mechanism along with quantum-safe symmetric encryption (AES 256 GCM) of Ethernet frame (L2) and IP packet (L3) payload data at 1 Gbps encryption throughput rate. Enhanced IPSEC framework supports establishment of multiple security associations between two or more peer PINE encryptors in a point-to-multipoint network topology. View Product Video

Crypto Features β€’ Hybrid NIST FIPS-203 ML-KEM and Static Keys based encryption key generation β€’ AES-256 GCM Symmetric Encryption β€’ Side Channel Leakage resistant crypto IP Cores β€’ In-built NIST SP 800-90B compliant TRNG β€’ Red-Black Encryption Separation Networking Features β€’ Enhanced IPSEC ESP tunnel encapsulation β€’ Point-to-Multipoint Network Topology Support β€’ 1 Gbps encryption throughput β€’ Ethernet frame (L2) and IP Packet (L3) Payload Encryption β€’ In-band post-quantum FIPS-203 ML-KEM key generation Security Features β€’ Rugged conduction cooled enclosure β€’ Active tamper monitoring with battery backup β€’ Field replaceable Lithium battery β€’ Circular pin connectors with custom cables for security β€’ Emergency Erasure Switch β€’ Multi-factor authentication based user identification System Features β€’ FPGA based design for high throughput and low latency β€’ Touch screen based on-board system GUI β€’ SNMPv3 based NMS Support β€’ Tabletop & 19” telecom rack compatible equipment β€’ Hot-standby power supplies (AC & DC), 200 W (Typical) β€’ 5U (EIA), 8.75” H X 19” W X 23” D, Weight < 25 Kg

Crypto Features β€’ Hybrid NIST FIPS-203 ML-KEM and Static Keys based encryption key generation β€’ AES-256 GCM Symmetric Encryption β€’ Side Channel Leakage resistant crypto IP Cores β€’ In-built NIST SP 800-90B compliant TRNG β€’ Red-Black Encryption Separation Networking Features β€’ Enhanced IPSEC ESP tunnel encapsulation β€’ Point-to-Multipoint Network Topology Support β€’ 1 Gbps encryption throughput β€’ Ethernet frame (L2) and IP Packet (L3) Payload Encryption β€’ In-band post-quantum FIPS-203 ML-KEM key generation Security Features β€’ Rugged conduction cooled enclosure β€’ Active tamper monitoring with battery backup β€’ Field replaceable Lithium battery β€’ Circular pin connectors with custom cables for security β€’ Emergency Erasure Switch β€’ Multi-factor authentication based user identification System Features β€’ FPGA based design for high throughput and low latency β€’ Touch screen based on-board system GUI β€’ SNMPv3 based NMS Support β€’ Tabletop & 19” telecom rack compatible equipment β€’ Hot-standby power supplies (AC & DC), 200 W (Typical) β€’ 5U (EIA), 8.75” H X 19” W X 23” D, Weight < 25 Kg

Interfaces β€’ Plain Text Ports: Two 10/100/1000 Base-T interfaces and Two 1G/10G Single Mode Duplex LC Connector β€’ Cipher Text Ports: Two 10/100/1000 Base-T interfaces and Two 1G/10G Single Mode Duplex LC Connector β€’ One USB 2.0 (Device Mode) port for Fill Gun β€’ One USB 2.0 (OTG) port for Algorithm Loading Device (ALD) β€’ One USB 3.0 port for Software loading (SLP) β€’ One RS232 serial interface β€’ One USB-UART Console Interface β€’ QKD interface (1 G Ethernet MACsec – Copper & Optical-OM3) β€’ NMS interface (1 G Ethernet MACsec – Copper & Optical-OM3) β€’ GUI Interface (1 G Copper) Dimension β€’ 5U (EIA) 8.75” H X 19” W X 23” D Power Supply β€’ DC Ports : 18-75 VDC (Two) β€’ AC Ports : 90-275 VAC (Two) 50-60 Hz β€’ All power supplies are in hot standby mode (220V AC to 24V DC adaptor shall be provided for DC ports) Cooling/Thermal β€’ Conduction cooled fan less system Battery β€’ Two external battery ports for RTC and Tamper β€’ Li-SOCl2 Type D 3.6 V Primary Cell (Two) Power Consumption β€’ Power consumption 200 Watts (Typical) LED Indications β€’ For encryption β€’ For power β€’ System Alarm β€’ Emergency Erasure β€’ Tamper User Interface β€’ CLI /On-board Touch GUI/Web GUI Emergency Erasure β€’ Keylock switch based emergency erasure (Two keys) System Destruction β€’ Keylock switch based system destruction (Two keys) Security Token β€’ Crypto Ignition Key (CIK) token



CIVA – C-DOT Assistant
Chat with CIVA
Your Telecom Guide
CIVA
CIVA
CIVA
CDOT intelligent virtual assistant
0 selected
πŸ“ Share your feedback

Help us improve CIVA with your thoughts.