Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator

Overview

In the beginning of the 2000s, strong progress has been made on hacking NIST standard hash functions, which led to break of the SHA-1 algorithm. This achievement had a lot of consequences on the other NIST standard hash function, SHA-2, since both algorithms share a lot of similarities. In order to be prepared against an effective break of SHA-2, NIST launched a contest to choose a new hash standard, with original approach, different from those used for the previous ones. In 2012, the algorithm Keccak developed by a Western European team was selected as the winner of the NIST contest and became the new hash function standard known as SHA-3.

Key Features

  • AMBA interface
  • Supported function: SHA-224, SHA-256, SHA-384, SHA-512, SHAKE-128, SHAKE-256
  • Compliant with FIPS-202
  • Tunable performance (area and performance) - From low area to high-performance
  • Compliant with HMAC function
  • Optional: automatic padding

Benefits

  • Easy to integrate
  • Tunable solution
  • Fully digital
  • AMBA interface
  • Strong technical support

Applications

  • Automotive
  • IoT
  • eHealth
  • Defense
  • Payments
  • Servers
  • Smart Grid
  • Identity
  • Media & Entertainment
  • Memory & Storage
  • Consumer Electronics
  • Edge & Cloud
  • Trusted Computing
  • AI
  • Printer
  • Industry

Deliverables

  • Technical specifications document including User manual, Integration guideline, Test Plan
  • VHDL RTL code
  • VHDL testbench and scripts for simulation
  • RTL of the AMBA wrapper
  • SW driver
  • Support for integration

Technical Specifications

Maturity
Silicon Proven
×
Semiconductor IP