KiviCore’s employees bring more than 20 years of experience in RTL and IP core development, including the design and productization of cryptographic IP cores.
Reliable cryptographic Hash Functions for embedded Systems
Fundamental building blocks for security
Hash algorithms are fundamental components in embedded security architectures. They are used for verfiying data integrity, authentication, key derivation and as part of cryptographic protocols.
NIST compliant hash functions
Widely used cryptographic hash algorithms include the Secure Hash Algorithm (SHA) family, standardized by NIST with SHA2 and SHA3. Derived functions such as HMAC extend their use to authentication and secure protocol design.
Hash functions used in embedded security
Hash functions are used to verify firmware before execution, ensuring that only trusted FPGA bitstreams or software images are loaded. They are part of secure communication protocols such as TLS and IPsec, enable MAC-based message authentication, and protect the integrity of data stored in flash or external memory.
KiviHash | Hash Functions IP Core Family
KiviHash-SHA3
Supports SHA-3 hash functions SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512 and extendable output functions (XOF), SHAKE-128 & SHAKE-256 compliant to NIST´s FIPS 202 standard.
KiviHash-SHA256
Supports SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.
KiviHash-SHA512/384
Supports SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.
KiviHash-HMAC-SHA256
Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-256 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.
KiviHash-HMAC-SHA512
Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-512 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.
KiviCore IP Cores
Low license fees and free evaluation licenses make hash IP Cores accessible even for mid-size FPGA projects with limited budgets.
Evaluation packages are available via download, with rapid responsive web support to keep your project moving.