Compact Versatile Core for SHA-3-224/256/384/512 and (c)SHAKE-128/256

Overview

XIP3030C from Xiphera is a compact IP core designed for versatile support of all variants of the SHA-3 hash function and related extendable-output function SHAKE as well as the SHA-3 derived function cSHAKE and its variants KMAC, TupleHash and ParallelHash.

Because of the versatile algorithm support, XIP3030C can be used in various applications that require SHA-3 hashing or other supported SHA-3 based functionalities. XIP3030C consumes only small amounts of logic resources that allows it to be used even in settings where resources are scarce.

XIP3030C has been designed for easy integration with FPGA- and ASIC-based designs in a vendor-agnostic design methodology, and the functionality of XIP3030C does not rely on any manufacturer-specific features.

XIP3030C has also been successfully validated in the CAVP (Cryptographic Algorithm Validation Program) by NIST (National Institute for Standards and Technology).

Key Features

  • Minimal Resource Requirements: XIP3030C requires 673 ALMs with Intel Cyclone V SX SoC or 1394 6-input ALMs with Intel Cyclone 10 LP and use only some internal memory blocks in a typical FPGA implementation.
  • Versatile Algorithm Support: XIP3030C supports SHA-3-224/256/384/512, SHAKE-128/256, and cSHAKE-128/256.
  • Secure Architecture: The execution time of XIP3030C is independent of the input values and, consequently, provides full protection against timing-based side-channel attacks.
  • Standard Compliance: XIP3030C is compliant with FIPS 202 and SP 800-185.
  • Easy Integration: The 64-bit interface of XIP3030C supports easy integration to various systems.

Benefits

  • Fully digital design
  • Portable to any ASIC or FPGA technology
  • Fully standard compliant
  • Easy to integrate
  • Several bus interfaces available
  • IP core designed in-house at Xiphera
  • Technical support by the original designers and cryptographic experts
  • CAVP validated

Block Diagram

Compact Versatile Core for SHA-3-224/256/384/512 and (c)SHAKE-128/256 Block Diagram

Applications

  • Hash functions are widely used in various applications, for example in verifying the integrity of messages and files, generating and verifying digital signatures, verifying passwords, and also in blockchain technology. Additionally, hash functions are used in cryptographic primitives such as Pseudorandom Number Generators (PRNGs) and Message Authentication Codes (MACs)

Deliverables

  • Please contact sales@xiphera.com for pricing and your preferred delivery method. XIP3032H can be shipped in a number of formats, including netlist, source code, or encrypted source code.
  • Additionally, synthesis scripts, a comprehensive testbench, and a detailed datasheet including an integration guide are included.

Technical Specifications

Foundry, Node
Any
Maturity
Hardware Tested
Availability
Immediate
×
Semiconductor IP