Secure software implementation of SHA-1, SHA-2 and HMAC-SHA-256
Overview
The Software HMAC-SHA is a secure cryptographic library including SHA-1, SHA-2 and HMAC-SHA-256 implementations.
Key Features
- SHA-1 fully compliant with the FIPS 180-4 standard
- SHA-2 fully compliant with the FIPS 180-4 standard
- HMAC-SHA-256 fully compliant with the FIPS 198-1 standard
- SHA-160, SHA-224, SHA-256, SHA-384 and SHA-512 supported
- automatic padding by the API
- state-of-the-art countermeasures against SPA and DPA attacks: boolean masking; arithmetic masking
- core functions ASM-optimized for security
- straightforward integration thorugh a comprehensive API
Benefits
- FIPS 180-4 compliant
- FIPS 198-1 compliant
- Hardened against SPA & DPA
- ASM-optimized core functions
- Auto-padding
Deliverables
- C source codes
- Assembly source codes
- compilation scripts (makefile)
- C test vectors
- design specification
Technical Specifications
Maturity
Silicon proven
Availability
Available
Related IPs
- Software solution targeting the configuration of Ethernet switches and endpoints in TSN networks
- Complete memory system supporting any combinations of SDR SDRAM, DDR, DDR2, Mobile SDR, FCRAM, Flash, EEPROM, SRAM and NAND Flash, all in one IP core
- Clock and Data Recovery of HDB3/B3ZS coded signals
- SHA-1 Secure Hashing Algorithm
- SHA-1 Secure Hash Function
- Secure Hash Algorithm SHA1