You are here:
HMAC-SHA256 Accelerator
Chevin Technology’s HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes. Message authentication is increasingly required by corporations, government organisations, and individuals to secure communications between sender and receiver. The HMAC – SHA256 authentication function is especially suited for cybersecurity, defense, and aerospace applications, and can be added to existing products, or designed into prototypes. Contact us for more information, or to discuss source code and netlist licensing options for Intel and AMD FPGAs and ASICs.
The all-RTL solution provides a fast and secure way to calculate a SHA256 hash for any message of any length. When combined with a secret key, it can also construct a HMAC keyed-hash message authentication code, which can be used to protect messages that are sent, and verify those that are received. The HMAC-SHA256 accelerator accepts multiple independent streaming messages/channels and support any number of arbitrary length messages. Number of channels is limited only by the memory resources provided, embedded Block RAM or external DDR. Typical use cases include highly secure RTL solutions where a CPU is unable to meet the required throughput and security performance.
The all-RTL solution provides a fast and secure way to calculate a SHA256 hash for any message of any length. When combined with a secret key, it can also construct a HMAC keyed-hash message authentication code, which can be used to protect messages that are sent, and verify those that are received. The HMAC-SHA256 accelerator accepts multiple independent streaming messages/channels and support any number of arbitrary length messages. Number of channels is limited only by the memory resources provided, embedded Block RAM or external DDR. Typical use cases include highly secure RTL solutions where a CPU is unable to meet the required throughput and security performance.
查看 HMAC-SHA256 Accelerator 详细介绍:
- 查看 HMAC-SHA256 Accelerator 完整数据手册
- 联系 HMAC-SHA256 Accelerator 供应商
Block Diagram of the HMAC-SHA256 Accelerator
HMAC-SHA256 Accelerator IP
- Whirlpool Crypto Accelerator
- AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA & Fault Injection Resistant Crypto Accelerator
- Secure-IC's Securyzr™ Tunable Public Key Cryptographic (RSA, ECDSA, SM2, Diffie-Hellman) accelerator - optional SCA protection
- Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator
- Secure-IC's Securyzr™ Tunable AES (ECB, CBC, CTR, XTS, CCM, GCM) accelerator - optional SCA protection
- Secure-IC's Securyzr™ High-performance AES-GCM accelerator - optional SCA protection