The SHA-3 IP core can ensure data integrity and/or user authentication in a range of applications, including IPsec and TLS/SSL protocol engines, encrypted data storage, secure processing systems, e-commerce, and financial transaction systems.
- Self-contained: No external memory required
- SHA-3/Keccak cryptographic hashing functions provides intelligent buffer management option to receive new data in input buffer while processing existing data
- Hashing function selection among SHA3-224, SHA3-256, SHA3-384 and SHA3-512