Download your Xiphera's ASIC-specific product brief here.

Product Brief

HKDF/HMAC/SHA-256

SHA-256 IP Core with Extended Functionalities

Product code: XIP3322B

This IP Core from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 cryptographic hash function with extended support for HMAC message authentication code and HKDF key derivation function that are based on using SHA-256. SHA-256 is one of the most commonly used hash functions and is used in numerous cryptographic applications. It offers a good balance between performance and resource requirements.

We're committed to your privacy. Xiphera uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Proven security for ASIC designs

Xiphera’s cryptographic IP cores and security protocols provide support for ASIC designs. The IP cores are fully digital and therefore support in principle all ASIC process nodes.

Xiphera designs and implements cryptographic IP cores for FGPAs and ASICs.

Peace of mind in a dangerous world.

Xiphera protects your critical systems by designing security directly into hardware.

News
Reija Stenroos, our Marketing Director, joined Xiphera in March 2025. This spring, she celebrated her first anniversary with the company. We sat down with Reija to hear her insights and reflections on her first year at Xiphera.
Satellite links are often considered inherently secure due to their distance and specialised infrastructure. In reality, this assumption no longer holds. Sensitive data from critical infrastructure, enterprises, in-flight connectivity, and even government systems is increasingly transmitted over satellite networks without sufficient protection. At the same time, satellite communications are becoming a target for both cyber and geopolitical actors.
As quantum computing advances, discussions around the future of cryptography are becoming increasingly common. In many conversations, one message is often heard: in the future, only quantum-safe cryptography will be needed. While quantum computing does introduce real risks to certain cryptographic systems, the reality is more nuanced. Future secure systems will not solely on a single “quantum-safe” algorithm. Instead, they will continue to combine multiple cryptographic technologies.