KiviCore’s employees bring more than 20 years of experience in RTL and IP core development, including the design and productization of cryptographic IP cores.
KiviHash - Crypto Hash Function IP Cores
Reliable cryptographic Hash Functions for embedded Systems
Fundamental building blocks for security
Hash algorithms are fundamental components in embedded security architectures. They are used for verfiying data integrity, authentication, key derivation and as part of cryptographic protocols.
NIST compliant hash functions
Widely used cryptographic hash algorithms include the Secure Hash Algorithm (SHA) family, standardized by NIST with SHA2 and SHA3. Derived functions such as HMAC extend their use to authentication and secure protocol design.
Hash functions used in embedded security
Hash functions are used to verify firmware before execution, ensuring that only trusted FPGA bitstreams or software images are loaded. They are part of secure communication protocols such as TLS and IPsec, enable MAC-based message authentication, and protect the integrity of data stored in flash or external memory.
Hash Functions IP Core Family
KiviHash provides SHA-256, SHA-512/384, SHA3 and HMAC implementations for hardware-based integrity, authentication and protocol functions in FPGA and ASIC designs.
KiviHash-SHA256
KiviHash-SHA512/384
KiviHash-SHA3
KiviCore IP Cores
Low license fees and free evaluation licenses make hash IP Cores accessible even for mid-size FPGA projects with limited budgets.
Evaluation packages are available via download, with rapid responsive web support to keep your project moving.