1.3.5 SHA2
Description
The Secure Hash Algorithm (SHA) was designed by the United States National Security Agency (NSA) and is a U.S. Federal Information Processing Standard (FIPS). SHA-2 includes major improvements over SHA-1. The SHA-2 family includes six hash functions, with two truncated versions: SHA-512/224 and SHA-512/256. This demo application demonstrates the functionality of Crypto v4 SHA-2 functions.
Downloading and Building the Application
To clone or download this application from Github, go to the main page of this repository and then click Clone button to clone this repository or download as zip file. This content can also be downloaded using MPLAB® Code Configurator Content Manager.
Path of the application within the repository is apps/examples/hash/sha2/sha2_group.
The following table shows the contents of the project group.
Project Name | Description |
---|---|
pic32ck_sg01_cult.X | MPLABX nonsecure project for PIC32CK SG Curiosity Ultra Development Board |
pic32ck_sg01_cult_secure.X | MPLABX secure project for PIC32CK SG Curiosity Ultra Development Board |
Setting Up the Hardware
PIC32CK SG Curiosity Ultra Development Board
- Connect the Debug USB port on the board to the computer using a micro USB cable.
- Open a serial monitor with baud rate set to 115200, 8-bit data, no parity, 1 stop bit.
Running the Application
- Open the project group.
- Open the nonsecure version of the project.
- Build and program the application using its IDE and observe the serial COM output.
- The program displays which functions are being demonstrated, and prints if they are completed successfully.