Vendor: ElectraIC Category: Hash / MAC

SHA3 IP Core

SHA3 IP Cores perform cryptographic hashing in compliance with the SHA-3 (Secure Hash Algorithm 3) specifications defined in 'FIP…

Overview

SHA3 IP Cores perform cryptographic hashing in compliance with the SHA-3 (Secure Hash Algorithm 3) specifications defined in 'FIPS 202'. This standard specifies methods for generating secure hash values using the SHA-3 algorithm. 

SHA3 IP Cores support the SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, and SHAKE256 functions, and are byte-oriented in their implementation. VHDL is used as the Hardware Description Language of the IP Core. AXI4-Stream interface can be designed and provided upon request.

Key features

  • supports hashing for functions listed below:
    • SHA3-224
    • SHA3-256
    • SHA3-384
    • SHA3-512
    • SHAKE128
    • SHAKE256
  • is compliant with FIPS 202.
  • has fully stallable input and output interfaces.

Block Diagram

What’s Included?

  • Encrypted Netlist
  • Synthesis Scripts
  • Comprehensive Documentation
  • SHA3 Validation SystemTestbenches in SystemVerilog

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
EIP-13009
Vendor
ElectraIC

Provider

ElectraIC
HQ: Turkey
ElectraIC provides electronic circuit design and verification services in the field of ASIC, FPGA and embedded systems. The team has the experience of working with global multinational companies. The company has been involved in and continues to take part in many projects, especially in Aerospace and Defense areas, as well as consumer electronics. Functional safety using DO-254, ISO 26262 and EN 50129 are speciality areas. ElectraIC delivers also trainings on ASIC, FPGA and embedded systems. Contributions ElectraIC can make to your organization:
  • Design IP Cores
  • Design & Verification Services: ASIC / FPGA and Embedded Systems’ development
  • Functional Safety Consultancy & Training Services
  • Trainings: Wide range of trainings with more than 150 different trainings

Learn more about Hash / MAC IP core

The Challenge of Automotive Hardware Security Deployment

A complete reinvention of the automotive industry is currently underway. Autonomous driving, connected vehicles, and the electrification of the powertrain all represent a once-in-a-generation shift in the manufacturing process.

Embracing a More Secure Era with TLS 1.3

TLS 1.3 offers attractive speed and security improvement benefits that are hard to ignore. The handshake phase was sped up by removing one or more roundtrips (back and forth messaging between client and server) in TLS 1.3 – with “or more” meaning that for certain cases, roundtrips can be entirely eliminated (0-RTT).

Standardized PUF-based Solution for Device eID

In this column, after a background introduction, we will first discuss IEEE 802.1AR standard on secure device identity. Next, we’ll assert PUF is an enabling solution for the device eID. Third, we will discuss PUF related international standards. Fourth, we will present a short tutorial on PUFiot. Fifth, we will assert that PUFiot is an ideal Device eID with wide applications. Finally, we will draw a conclusion on the future trend of Device eID development.

Implementing Ultra Low Latency Data Center Services with Programmable Logic

Data centers require many low-level network services to implement high-level applications. Key-Value Store (KVS) is a critical service that associates values with keys and allows machines to share these associations over a network. Most existing KVS systems run in software and scale out by running parallel processes on multiple microprocessor cores to increase throughput.

Security in vehicular systems

With the advent of IoT and increasingly interconnected and autonomous nature of a vehicle’s control modules, there has been an exponential increase in V2V, V2X and inter vehicular communications. This in turn increases the attack surface for hackers which demands state-of-art security features in modern automotive microcontrollers, moreover safety and security go hand in hand.

Frequently asked questions about Hash / MAC IP cores

What is SHA3 IP Core?

SHA3 IP Core is a Hash / MAC IP core from ElectraIC listed on Semi IP Hub.

How should engineers evaluate this Hash / MAC?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Hash / MAC IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP