The secure hash algorithms (SHA) are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) and are used as a one-way function to provide a digest unique to the input data where the original data cannot be recovered from the digest.
SHA2
The PMC contains one SHA2 engine defined by FIPS 180-4 and one SHA3 engine defined by FIPS-202 standards. The SHA2 engine supports modes of SHA-256, SHA-384, SHA-512.
SHA3
The SHA3 engine provides SHA3-256, SHA3-384, SHA3-512, and SHAKE256 modes; these are standardized by NIST (FIPS-202).
The SHA accelerator can be used alone or together with the asymmetric accelerators to provide image authentication. It is also used to perform an integrity check of the RCU ROM prior to execution. The SHA accelerator generates a 384-bit digest value. If a design requires a 256-bit digest, the least significant 256 bits of the digest should be used (see Recommendation for Applications Using Approved Hash Algorithms NIST Special Publication 800-107).
Documentation
For additional details, see the Versal Adaptive SoC Security Manual (UG1508).
This manual requires an active NDA to download from the Design Security Lounge.