Secure Hash Algorithm 3 (SHA-3)

Xiphera’s CAVP-validated compact and high-speed SHA-3 IP cores, using Secure Hash Algorithm 3, are designed to verify the integrity of the data.

Xiphera’s comprehensive hash function IP portfolio ensures the security and integrity of data through robust cryptographic standards. SHA-3 IP cores provide versatile functionality for various applications, from data integrity verification to password security. The SHA-3 portfolio is powered by Xiphera’s in-house designed IP cores and are optimised for efficiency and high performance in FPGA and ASIC implementations.

Boost your security with advanced hash functions for…

Data integrity verification

Digital signatures

Blockchain transactions

Key features

  • Optimised resource requirements
  • High throughput – tens of Gbps on single instance
  • Compliant with relevant NIST standards
  • CAVP validated by NIST
  • Pure RTL without hidden CPU or software components
  • Efficient and optimised architecture
  • Easy system integration
  • Vendor agnostic FPGA/ASIC implementation

Technical specifications

Xiphera’s SHA-3 IP cores support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC, TupleHash, and ParallelHash.

Product code: XIP3030C

  • Tens of Mbps
  • Only ~1 kLUTs (FPGA)
  • CAVP validated IP core

Product code: XIP3030H

  • Tens of Gbps
  • Below 7 kLUTs (FPGA)
  • CAVP validated IP core

Find more technical details, including FPGA resources & peak performance as well as ordering instructions, from the product briefs. 

Register for the ASIC-specific product brief to learn more about the technical details and performance numbers for ASIC applications.

Key Derivation Functions

Xiphera’s portfolio of hash algorithms includes a portfolio of Key Derivation Functions (KDFs). These algorithms, including HKDF and HMAC, can be used for computing cryptographic keys from passwords or for stretching a cryptographic key to a longer key or to several keys.