Use Cases

Hardware crypto accelerator provides simultaneous traffic processing in the following modes:

  • "Encryption": receiving from a secure network interface, encryption, counting imitation insertion, encapsulation and sending packets through an open network interface.
  • "Decryption": reception from an open network interface, de-encapsulation, decryption, verification of imitation insertion and sending packets through secure network interface.


Hardware encryption accelerator for encrypting Ethernet traffic based on the GOST core.

The crypto module provides encryption / decryption of IP packets at speeds up to 20 Gbps.