Skip to content

   We secure embedded systems

Reliable cryptographic Hash Functions for embedded Systems 

shield-hash
Fundamental building blocks for security 

Hash algorithms are fundamental components in embedded security architectures. They are used for verfiying data integrity, authentication, key derivation and as part of cryptographic protocols.

shield-hash
NIST compliant hash functions

Widely used cryptographic hash algorithms include the Secure Hash Algorithm (SHA) family, standardized by NIST with SHA2 and SHA3. Derived functions such as HMAC extend their use to authentication and secure protocol design. 

shield-hash
Hash functions used in embedded security

Hash functions are used to verify firmware before execution, ensuring that only trusted FPGA bitstreams or software images are loaded. They are part of secure communication protocols such as TLS and IPsec, enable MAC-based message authentication, and protect the integrity of data stored in flash or external memory.

Hash Functions IP Core Family

 

KiviHash provides SHA-256, SHA-512/384, SHA3 and HMAC implementations for hardware-based integrity, authentication and protocol functions in FPGA and ASIC designs. 

KiviHash-SHA256

0

KiviHash-SHA512/384

8 /month

KiviHash-SHA3

16 /month

KiviHash-SHA256

KiviHash-SHA512/384

KiviHash-SHA3

Supports SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.
Supports SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.
Supports SHA-3 hash functions SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512 and extendable output functions (XOF), SHAKE-128 and SHAKE-256 compliant to NIST´s FIPS 202 standard.

KiviCore IP Cores

KiviCore’s employees bring more than 20 years of experience in RTL and IP core development, including the design and productization of cryptographic IP cores.

Money
Cost-efficient Licensing Model

Low license fees and free evaluation licenses make hash IP Cores accessible even for mid-size FPGA projects with limited budgets. 

Long-term
Fast Availability and direct Support

Evaluation packages are available via download, with rapid responsive web support to keep your project moving. 

Customized
Easy integration into SoC Designs
AXI4-Lite interfaces, platform-agnostic C source code (HAL + API), and clear documentation enable fast integration into hardware–software co-design flows. 
Shield-dark
European Technology with reliable Access 
Developed in Germany, with direct access to evaluation packages and predictable availability giving design teams transparency, control, and long-term planning security.