Banner photo, downloaded from Pixabay

Hash Functions

A cryptographic hash function is a mathematical algorithm that computes a fixed-length hash value for an arbitrarily long input message. The hash value can be seen as a "fingerprint" of the message: if the message changes even slightly, then its hash value changes completely.

Cryptographic hash algorithms are essential building blocks for many cryptographic protocols. They can be be used for constructing Message Authentication Codes (MACs), for example HMAC, and Key Derivation Functions (KDFs) such as HKDF. Notable cryptographic hash algorithms include the Secure Hash Algorithms (SHA) standardized by the U.S. NIST (National Institure of Standards and Technology), of which SHA-2 and SHA-3 algorithm families are considered secure and are used in numerous applications today.

SHA-2 (Secure Hash Algorithm 2)

The following IP cores implement the SHA-2 algorithm, please click on the Product Code or PDF icon to download a Product Brief of the IP core.

  • XIP3022B: SHA-256/224, balanced version:
  • XIP3026B: SHA-512, SHA384, SHA512/256, SHA512/224, balanced version:
  • XIP3027C: Compact IP core supporting SHA-256 and SHA-512, please contact info@xiphera.com for Product Brief
All SHA-2 IP cores Comply with FIPS 180-4.

SHA-3 (Secure Hash Algorithm 3)

The following IP cores implement the SHA-3 algorithm, please click on the Product Code or PDF icon to download a Product Brief of the IP core.

  • XIP3032H: SHA3-256, high-speed version:
  • XIP3034H: SHA3-512, high-speed version:
  • XIP3043H: High-speed IP core supporting KMAC-128, please contact info@xiphera.com for Product Brief.

All SHA-3 IP cores comply with FIPS 202.

XIP3043H complies with NIST SP 800-15.

Key Derivation Functions

The following IP cores implement Key Derivation Functions.