Path: EDN Asia >> Product Centre >> IC/Board/Systems Design >> Security IP compliant to the SHA-3 cryptographic standard
IC/Board/Systems Design Share print

Security IP compliant to the SHA-3 cryptographic standard

01 Oct 2015

Share this page with your friends

Synopsys Inc. has introduced what it says is the industry's first security IP solutions compliant to the Secure Hash Algorithm-3 (SHA-3) cryptographic standard from the National Institute of Standards and Technology (NIST). The DesignWare SHA-3 Cryptography IP solutions allow developers to protect the integrity of electronic information in applications such as message authentication and digital signatures, random number generation and key derivation functions, stated the company.

By providing security IP that is compliant to the SHA-3 standard, Synopsys enables developers to have the latest hash algorithm readily available for integration into their next-generation SoCs.

Hash algorithms transform digital messages into a short message digest for use in digital signatures and other security applications. A change in the original message text creates a change in the digest, which makes it easier to detect modifications to the original message. The DesignWare SHA-3 Cryptography IP provides exceptional performance in specific hardware implementations compared to the prior generation SHA-2 algorithm. The SHA-3 IP is based on the Keccak hash scheme, which uses a new "sponge construction" domain extender that can be adjusted to trade security strength for higher throughput, generating larger or smaller hash outputs as needed. The DesignWare Cryptography IP solutions for SHA-3 do not replace the SHA-2 family of hash functions, which remains secure and viable, but instead provides chipset vendors and device manufacturers with an alternative solution to future-proof their devices.

The DesignWare SHA-3 Security IP is scheduled to be available in November 2015 as a standalone configurable hash core, as part of the cryptography software library or integrated in a security subsystem.

Want to more of this to be delivered to you for FREE?

Subscribe to EDN Asia alerts and receive the latest design ideas and product news in your inbox.

Got to make sure you're not a robot. Please enter the code displayed on the right.

Time to activate your subscription - it's easy!

We have sent an activate request to your registerd e-email. Simply click on the link to activate your subscription.

We're doing this to protect your privacy and ensure you successfully receive your e-mail alerts.

Add New Comment
Visitor (To avoid code verification, simply login or register with us. It is fast and free!)
*Verify code:
Tech Impact

Regional Roundup
Control this smart glass with the blink of an eye
K-Glass 2 detects users' eye movements to point the cursor to recognise computer icons or objects in the Internet, and uses winks for commands. The researchers call this interface the "i-Mouse."

GlobalFoundries extends grants to Singapore students
ARM, Tencent Games team up to improve mobile gaming

News | Products | Design Features | Regional Roundup | Tech Impact