Hash & Mac Functions IP
Hash functions are mathematical functions which are used to validate the integrity of a message.
The hash function consists in transforming a long data (called message) in a small message (called digest). The hash function is a one-way function, which makes reverse computation almost impossible.
HMAC (Hash Message Authentication Code) functions are cryptographic functions which are used to validate the authenticity (and so integrity) of a message.
The MAC function consists in transforming a long data (called message) in a small message (called MAC) using a hash function and a cryptographic secret key. A MAC function may also be based on a block cipher engine like AES or SM4. In that case, they are called CMAC (Cipher-based MAC) or GMAC (Galois MAC).
Secure-IC’s portfolio includes the following Hash & MAC functions
- Hash functions:
- MAC functions:
- HMAC on SHA-1, SHA-2, SHA-3, SM3
- CMAC on AES, SM4
- GMAC on AES, SM4
Hash and MAC integrity IP offers the following features:
- Optional protection against side-channel attacks
- Several hash functions can be combined in the same HMAC overlay
- Tunable throughput and area
- AMBA (APB, AHB, AXI) interface