Hardware implementation of SHA-3 (keccak) algorithm

Project maintainers


Name: sha-3
Created: Sep 12, 2014
Updated: Nov 29, 2017
SVN: Check description below for external links
Bugs: 1 reported / 0 solved
Star4you like it: star it!

Other project properties

Category:Crypto core
Development status:Planning
Additional info:Design done
WishBone compliant: No
WishBone version: n/a
License: LGPL


This project is the hardware implementation of SHA-3 (keccak) Hash function. SHA-3, originally known as Keccak, is a cryptographic hash function and is the winner of the NIST hash function competition. Because of the successful attacks on MD5, SHA-0 and theoretical attacks on SHA-1, NIST perceived a need for an alternative, dissimilar cryptographic hash, which became SHA-3. This is the implementation of High speed core.

Keccak is a family of hash functions that is based on the sponge construction, and hence is a sponge function family. In Keccak, the underlying function is a permutation chosen in a set of seven Keccak-f permutations, denoted Keccak-f[b], where b ∈ {25, 50, 100, 200, 400, 800, 1600} is the width of the permutation. The width of the permutation is also the width of the state in the sponge construction.


The reference links are given below




This project is licensed under LGPL license, version 3.0(LGPL-3.0)