The Secure Hash Algorithm (SHA) is a family of cryptographic hash function. This family includes SHA-0, SHA-1, SHA-2 and SHA-3. The SHA IP is focused on SHA-1 and SHA-2 algorithms.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
Tunable Hash (SHA1-SHA2) Hardware accelerator
Overview
Key Features
- AMBA interface
- Supported function: SHA1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Compliant with FIPS-180-4
- Tunable performance (area and performance) - From low area to high-performance
- Compliant with HMAC function
- Optional: automatic padding
Benefits
- Easy to integrate
- Tunable solution
- Fully digital
- AMBA interface
- Strong technical support
Applications
- Automotive
- IoT
- eHealth
- Defense
- Payments
- Servers
- Smart Grid
- Identity
- Media & Entertainment
- Memory & Storage
- Consumer Electronics
- Edge & Cloud
- Trusted Computing
- AI
- Printer
- Industry
Deliverables
- Technical specifications document including User manual, Integration guideline, Test Plan
- VHDL RTL code
- VHDL testbench and scripts for simulation
- RTL of the AMBA wrapper
- SW driver
- Support for integration
Technical Specifications
Maturity
Silicon Proven