Skip to content

   We secure embedded systems

Reliable cryptographic Hash Functions for embedded Systems 

shield-hash
Fundamental building blocks for security 

Hash algorithms are fundamental components in embedded security architectures. They are used for verfiying data integrity, authentication, key derivation and as part of cryptographic protocols.

shield-hash
NIST compliant hash functions

Widely used cryptographic hash algorithms include the Secure Hash Algorithm (SHA) family, standardized by NIST with SHA2 and SHA3. Derived functions such as HMAC extend their use to authentication and secure protocol design. 

shield-hash
Hash functions used in embedded security

Hash functions are used to verify firmware before execution, ensuring that only trusted FPGA bitstreams or software images are loaded. They are part of secure communication protocols such as TLS and IPsec, enable MAC-based message authentication, and protect the integrity of data stored in flash or external memory.

KiviHash | Hash Functions IP Core Family

KiviHash-SHA3

 

Supports SHA-3 hash functions SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512 and extendable output functions (XOF), SHAKE-128 & SHAKE-256 compliant to NIST´s FIPS 202 standard.

KiviHash-SHA256

 

Supports SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.

KiviHash-SHA512/384

 

Supports SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.

KiviHash-HMAC-SHA256

 

Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-256 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.

KiviHash-HMAC-SHA512

 

Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-512 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.

KiviCore IP Cores

KiviCore’s employees bring more than 20 years of experience in RTL and IP core development, including the design and productization of cryptographic IP cores.

Money
Cost-efficient Licensing Model

Low license fees and free evaluation licenses make hash IP Cores accessible even for mid-size FPGA projects with limited budgets. 

Long-term
Fast Availability and direct Support

Evaluation packages are available via download, with rapid responsive web support to keep your project moving. 

Customized
Easy integration into SoC Designs
AXI4-Lite interfaces, platform-agnostic C source code (HAL + API), and clear documentation enable fast integration into hardware–software co-design flows. 
Shield-dark
European Technology with reliable Access 
Developed in Germany, with direct access to evaluation packages and predictable availability giving design teams transparency, control, and long-term planning security.