Synopsys announces industry’s first security IP solutions for new SHA-3 cryptographic hash standard Compliant DesignWare SHA-3 cryptography IP protects the integrity of electronic content in applications including message authentication and digital signatures.

Highlights:

  • DesignWare Cryptography IP solutions are compliant with SHA-3, the latest standard released by the National Institute of Standards and Technology
  • IP solutions target a range of security applications such as message authentication, digital signatures, random number generation and key derivation functions
  • The SHA-3 hash algorithm offers strong security with exceptional performance capabilities in hardware implementations and an advanced cryptographic hash scheme
  • The DesignWare Security IP for SHA-3 is available as a standalone, configurable hash core, or as part of the cryptography software library or integrated in a security subsystem

Synopsys (Nasdaq:SNPS) has announced the industry’s first security IP solutions compliant to the Secure Hash Algorithm-3 (SHA-3) cryptographic standard from the National Institute of Standards and Technology (NIST). Synopsys’ DesignWare SHA-3 Cryptography IP solutions enable developers to protect the integrity of electronic information in applications such as message authentication and digital signatures, random number generation and key derivation functions. By providing security IP that is compliant to the SHA-3 standard, Synopsys enables developers to have the latest hash algorithm readily available for integration into their next generation system on chips (SoCs).

Hash algorithms transform digital messages into a short message digest for use in digital signatures and other security applications. A change in the original message text creates a change in the digest, which makes it easier to detect modifications to the original message. The DesignWare SHA-3 Cryptography IP provides exceptional performance in specific hardware implementations compared to the prior generation SHA-2 algorithm. The SHA-3 IP is based on the Keccak hash scheme, which uses a new “sponge construction” domain extender that can be adjusted to trade security strength for higher throughput, generating larger or smaller hash outputs as needed. The DesignWare Cryptography IP solutions for SHA-3 do not replace the SHA-2 family of hash functions, which remains secure and viable, but instead provides chipset vendors and device manufacturers with an alternative solution to future proof their devices.

“As it’s increasingly important to secure devices against the growing number of data breaches and malicious attacks, IP providers need to stay ahead of the security standards,” said John Koeter, vice president of marketing for IP and Prototyping at Synopsys. “Synopsys’ DesignWare Security IP solutions for the new SHA-3 algorithm enable developers to incorporate the necessary IP early in their development process and protect devices against future security vulnerabilities.”