default banner

Hash & Mac Functions IP

Hash functions are mathematical functions which are used to validate the integrity of a message.

The hash function consists in transforming a long data (called message) in a small message (called digest). The hash function is a one-way function, which makes reverse computation almost impossible.

HMAC (Hash Message Authentication Code) functions are cryptographic functions which are used to validate the authenticity (and so integrity) of a message.

The MAC function consists in transforming a long data (called message) in a small message (called MAC) using a hash function and a cryptographic secret key. A MAC function may also be based on a block cipher engine like AES or SM4. In that case, they are called CMAC (Cipher-based MAC) or GMAC (Galois MAC).

Secure-IC’s portfolio includes the following Hash & MAC functions

  • Hash functions:
    • SHA-1 (FIPS 180-4)
    • SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) (FIPS 180-4)
    • SHA-3 (SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA3-512/224, SHA3-512/256, SHAKE-128, SHAKE-256) (FIPS 202)
    • Whirlpool (ISO/IOC 10118-3)
    • SM3 (CCCAO)
    • MD5

 

  • MAC functions:
    • HMAC on SHA-1, SHA-2, SHA-3, SM3
    • CMAC on AES, SM4
    • GMAC on AES, SM4

 

Hash and MAC integrity IP offers the following features:

  • Optional protection against side-channel attacks
  • Several hash functions can be combined in the same HMAC overlay
  • Tunable throughput and area
  • AMBA (APB, AHB, AXI) interface
Contact