Is this your business? Claim it to manage your IP and profile
The Keccak Hash Engine stands out for its versatility and function beyond traditional hashing. Renowned primarily for cryptography, it encompasses authentication, encryption, and pseudo-random number generation. At its core lies the Keccak-f cryptographic permutation, employing sponge construction for adaptability and configurability. Keccak's flexibility allows customization for varied hash outputs and security levels, adhering to standards like 3GPP TS 35.231 and NIST's FIPS 202. Thoroughly analyzed and publicly scrutinized, this engine is an epitome of secure and reliable cryptographic functions. Designed with ease of integration and extensive verification, it fits seamlessly into restrictive environments. It can be tailored for unique outputs, ensuring it meets the specific demands of diverse applications, from blockchain to secure communications.
The SHA-3 Crypto Engine is a hardware accelerator designed to enhance the performance of cryptographic hashing functions. It efficiently balances area and throughput, complying with NIST's FIPS 202 standard. Supporting various SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, it offers extendable output functions like SHAKE-128 and SHAKE-256. Emphasizing security, it provides robust protection against time-based side channel attacks and includes automatic byte padding for streamlined operation. Crafted with simplicity in mind, this IP core integrates seamlessly into a single clock domain environment, showcasing rigorous verification to ensure reliability. Its applications are extensive, catering to needs for data integrity checks and authentication across multiple sectors. With a focus on adaptability, it serves roles in Message Authentication Codes, IPsec and TLS/SSL protocols, secure boot engines, encrypted data storage, and more. Its adaptability extends into e-commerce, financial transaction systems, blockchain technology, and pseudo-random bit generation, making it a versatile choice for projects requiring robust security features. The SHA-3 Crypto Engine positions itself as a critical component in secure data management solutions for modern technology landscapes.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.