home products company partners clients news careers contact us
authentication fpga asic core

Authentication cores

Helion IP Core Products - Authentication cores

These are the Hashing and Message Authentication Code (MAC) algorithms typically used to provide data integrity checking and data authentication functions commonly used in secure protocols such as IPsec and TLS/SSL, and Digital Signature Standards such as FIPS 186-3.

These versatile cores, developed by Helion, represent some of the most efficient hashing and authentication solutions available in the industry. Please follow the links below for further information.


SHA-1 The NIST approved 32-bit secure hashing algorithm with 160-bit digest originally specified in FIPS 180-1.

SHA-2 family
(SHA-224, SHA-256, SHA-384, SHA-512)
The latest family of NIST approved 32-bit and 64-bit secure hashing algorithms specified in FIPS 180-3 providing digest lengths up to 512 bits.

MD5 The original industry-standard secure hashing algorithm with 128-bit digest specified in RFC 1321.

AES based
authentication
(XCBC, CMAC) cores
Based on AES encryption, these authentication modes offer a modern alternative to more traditional hashing functions.



Copyright © Helion Technology Licensing Ltd, 1998-2024. All rights reserved. Privacy and Cookies
Web Site Developed by Goldstag Limited