High-Speed Versatile Core for SHA-3-224/256/384/512 and (c)SHAKE-128/256

Overview

XIP3030H from Xiphera is a high-speed IP core designed for versatile support of all variants of the SHA-3 hash function and related extendable-output function SHAKE as well as the SHA-3 derived function cSHAKE and its variants KMAC, TupleHash and ParallelHash.

Because of the versatile algorithm support, XIP3030H can be used in various applications that require SHA-3 hashing or other supported SHA-3 based functionalities. XIP3030H is optimized for maximum speed and is optimal for applications that require high-speed hashing.

XIP3030H has been designed for easy integration with FPGA- and ASIC-based designs in a vendor-agnostic design methodology, and the functionality of XIP3030C does not rely on any manufacturer-specific features.

XIP3030H has also been successfully validated in the CAVP (Cryptographic Algorithm Validation Program) by NIST (National Institute for Standards and Technology).

Key Features

  • High Throughput: XIP3030H offers very high throughput with high maximum clock frequency achieving peak throughputs of several tens of Gbps depending on the target high-end FPGA. Contact sales@xiphera.com for ASIC resource requirements.
  • Versatile Algorithm Support: XIP3030H supports SHA-3-224/256/384/512, SHAKE-128/256, cSHAKE-128/256, KMAC, ParallelHash, and TupleHash.
  • Secure Architecture: The execution time of XIP3030H is independent of the input values and, consequently, provides full protection against timing-based side-channel attacks.
  • Standard Compliance: XIP3030H is compliant with FIPS 202 and SP 800-185.
  • Easy Integration: The 64-bit interface of XIP3030H supports easy integration to various systems.

Benefits

  • Fully digital design
  • Portable to any ASIC or FPGA technology
  • Fully standard compliant
  • Easy to integrate
  • Several bus interfaces available
  • IP core designed in-house at Xiphera
  • Technical support by the original designers and cryptographic experts
  • CAVP validated

Block Diagram

High-Speed Versatile Core for SHA-3-224/256/384/512 and (c)SHAKE-128/256 Block Diagram

Applications

  • Hash functions are widely used in various applications, for example in verifying the integrity of messages and files, generating and verifying digital signatures, verifying passwords, and also in blockchain technology. Additionally, hash functions are used in cryptographic primitives such as Pseudorandom Number Generators (PRNGs) and Message Authentication Codes (MACs)

Deliverables

  • Please contact sales@xiphera.com for pricing and your preferred delivery method. XIP3030H can be shipped in a number of formats, including netlist, source code, or encrypted source code.
  • Additionally, synthesis scripts, a comprehensive testbench, and a detailed datasheet including an integration guide are included.

Technical Specifications

Foundry, Node
Any
Maturity
Hardware Tested
Availability
Immediate
×
Semiconductor IP