Login

 Helion Technology Limited 
Short Desc. : SHA-1 hashing cores
Overview :
The SHA-1 Secure Hashing Algorithm was developed by the National Institute of Standards and Technology (NIST) in 1995 and is described in NIST FIPS PUB 180-2. It is a 32-bit algorithm which may be used to generate a unique 160-bit "digest" from an arbitrary length input message. This digest is effectively a compressed but irreversible representation of the entire input message, and can be used to determine whether the message has been tampered with in transit. When used as the basis for an HMAC, it can be keyed to provide additional security, where it is usually used to provide authentication of data in such applications as IPsec.
Features : - Implements SHA-1 secure hash algorithm to NIST FIPS Publication 180-2
- Fast operation – each 512-bit block requires only 82 master clock cycles
- Performs automatic message length calculation and padding insertion
- Optional user initialisation of IVs for optimised HMAC support
- HMAC wrapper available to make implementations quick and easy
- Optional state unload/reload feature for handling fragmented messages
- Simple external interface
Categories :
Portability :
Type : Soft
CST Webinar Series



Internet Business Systems © 2016 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy