Vendor: KiviCore Category: Hash / MAC

SHA-512/384 - Secure Hash Algorithm IP Core

KiviHash-SHA-512/384 is an IP core implementing the SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash func…

Overview

KiviHash-SHA-512/384 is an IP core implementing the SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard. It is optimized for high speed designs and easy integration with any FPGA and ASIC designs. Automatic byte padding is included. It features a standard AMBA® AXI4-Lite interface for straightforward hardware integration and HAL, and software driver (C-code, platform independent) for simple software integration. 

Key features

  • NIST FIPS 180-4 compliant
  • Supports cryptographic hashing for
  • automatic padding
  • High-speed design
  • AMBA® AXI4-Lite
  • Fully synchronous design
  • HAL and software driver (C-code, platform independent)
  • For any FPGA and ASIC

Block Diagram

Benefits

Tests and Verification

  • NIST CAVS test vectors for SHA hash functions
  • Extended verification through simulation
  • FPGA integration and implementation tests
  • Unity tests for driver and whole IP Core

Applications

The SHA-512/384 IP core offers a versatile solution for maintaining data integrity and verifying authentication across various applications. 

  • Firmware Updates: Detecting tampered or corrupted update packages
  • FPGA bitstreams: Ensuring only trusted configurations are loaded
  • Communication protocols: TLS, IPsec, MAC-based authentication
  • External memory integrity: Protecting stored data in flash or external RAM

What’s Included?

  • System Verilog RTL Source Code
  • Testbenches
  • Integration examples
  • Software example source code
  • Documentation

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
KiviHash-SHA-512/384
Vendor
KiviCore

Provider

KiviCore
HQ: Germany
KiviCore is an IP core and solution provider. Based on industry standards, KiviCore offers cyber secure and quantum safe IP cores and hardware/software solutions. Additionally, those can be tailored to specific needs of our customers. We place great emphasis on intensive customer support and guarantee customization to ensure that our solutions perfectly match your requirements. Target applications span a wide range, including Message Authentication Codes (MAC), IPsec and TLS/SSL protocol engines, secure boot engines, encrypted data storage, e-commerce platforms, financial transaction systems, blockchain, or pseudo random bit generation.

Learn more about Hash / MAC IP core

The Challenge of Automotive Hardware Security Deployment

A complete reinvention of the automotive industry is currently underway. Autonomous driving, connected vehicles, and the electrification of the powertrain all represent a once-in-a-generation shift in the manufacturing process.

Embracing a More Secure Era with TLS 1.3

TLS 1.3 offers attractive speed and security improvement benefits that are hard to ignore. The handshake phase was sped up by removing one or more roundtrips (back and forth messaging between client and server) in TLS 1.3 – with “or more” meaning that for certain cases, roundtrips can be entirely eliminated (0-RTT).

Standardized PUF-based Solution for Device eID

In this column, after a background introduction, we will first discuss IEEE 802.1AR standard on secure device identity. Next, we’ll assert PUF is an enabling solution for the device eID. Third, we will discuss PUF related international standards. Fourth, we will present a short tutorial on PUFiot. Fifth, we will assert that PUFiot is an ideal Device eID with wide applications. Finally, we will draw a conclusion on the future trend of Device eID development.

Implementing Ultra Low Latency Data Center Services with Programmable Logic

Data centers require many low-level network services to implement high-level applications. Key-Value Store (KVS) is a critical service that associates values with keys and allows machines to share these associations over a network. Most existing KVS systems run in software and scale out by running parallel processes on multiple microprocessor cores to increase throughput.

Security in vehicular systems

With the advent of IoT and increasingly interconnected and autonomous nature of a vehicle’s control modules, there has been an exponential increase in V2V, V2X and inter vehicular communications. This in turn increases the attack surface for hackers which demands state-of-art security features in modern automotive microcontrollers, moreover safety and security go hand in hand.

Frequently asked questions about Hash / MAC IP cores

What is SHA-512/384 - Secure Hash Algorithm IP Core?

SHA-512/384 - Secure Hash Algorithm IP Core is a Hash / MAC IP core from KiviCore listed on Semi IP Hub.

How should engineers evaluate this Hash / MAC?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Hash / MAC IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP