Download your Xiphera's resource sheet here.

Resource Sheet

CHACHA20-POLY1305

IP Core for ChaCha20-Poly1305 Authenticated Encryption

Product code: XIP2113H

This IP core from Xiphera is a Intellectual Property (IP) core designed for ChaCha20- Poly1305 Authenticated Encryption with Associated Data (AEAD) scheme protecting both confidentiality and authenticity at the same time. The current definitive standard for ChaCha20-Poly1305 is RFC 8439, “ChaCha20 and Poly1305 for IETF Protocols”. ChaCha20-Poly1305 is a combination of the ChaCha20 stream cipher and Poly1305 message authentication code, both algorithms designed by Daniel J. Bernstein, and it is used an AEAD scheme in multiple protocols, including TLS 1.3.

This document details FPGA and ASIC resource requirements and performance for the default configuration, including instantiation parameters, supported features, and the selected bus interface.

We're committed to your privacy. Xiphera uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Peace of mind in a dangerous world.

Xiphera protects your critical systems by designing security directly into hardware.

News
Whether you’re a technologist, business leader, or simply curious, physical AI is reshaping how we live, work, and interact with the world. Its potential to augment human capabilities, solve global challenges, and create new industries is why physical AI is dominating conversations today. But how do we secure these systems against cyber threats that could have real-world consequences?
Reija Stenroos, our Marketing Director, joined Xiphera in March 2025. This spring, she celebrated her first anniversary with the company. We sat down with Reija to hear her insights and reflections on her first year at Xiphera.
Satellite links are often considered inherently secure due to their distance and specialised infrastructure. In reality, this assumption no longer holds. Sensitive data from critical infrastructure, enterprises, in-flight connectivity, and even government systems is increasingly transmitted over satellite networks without sufficient protection. At the same time, satellite communications are becoming a target for both cyber and geopolitical actors.