Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing of Hach coprocessor

A coprocessor and processor technology, applied in the field of information security and encryption, can solve problems such as leakage and loss, and achieve the effect of flexible application

Inactive Publication Date: 2010-10-20
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the transmission process of important data with great economic value or related to the fate of the country and the army, any leak or error may cause immeasurable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing of Hach coprocessor
  • Method for realizing of Hach coprocessor
  • Method for realizing of Hach coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The specific implementation of the present invention is basically consistent with the structure and principle set forth in the description of the present invention. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0069] The invention discloses an implementation of a packet hash coprocessor, the hardware components of which include: a packet operation unit, a hash operation unit, a low-speed data interface read and write control unit, and a high-speed data interface processing unit (by input FIFO1 and output FIFO2 Composition), coprocessor core control unit and a dual-port RAM, internal FIFO3, command register, block number register, parameter register, group input buffer register Inda and group output buffer register Outda, etc.

[0070] Please refer to the attached figure 1 The solid line box part is a schematic structural diagram of the hardware components realized by the above-mentioned structure in the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a realizing method for a grouping hash coprocessor, which belongs to the field of information security password and can realize data encrypting calculation and participate in signature verification. The grouping hash coprocessor realized by using the method supports a grouping password system and HASH calculation, supports high and low speed data interfaces and a pipeline structure, can realize the functions of single grouping, single hash, first grouping then hash and simultaneous grouping and hash, etc., and has better practicability. The hardware parts used for realizing the functions include a grouping calculation unit, a hash calculation unit, a low speed data interface reading and writing control unit, a high speed data interface treatment unit (consisting of an input FIFO1 and an output FIFO2), a coprocessor core control unit and a double-opening RAM, an interior FIFO3, a command register, a block number register, a parameter register, a grouping input buffer register Inda and a grouping output buffer register Outda, etc.

Description

technical field [0001] The utility model relates to the field of information security ciphers, in particular to the hardware realization of grouping and HASH cipher operation co-processors. Background technique [0002] With the popularization of computer networks, it becomes possible to transmit a large amount of electronic data to all parts of the world through the network. However, in the transmission process of important data with great economic value or related to the fate of the country and the army, any leak or error may cause immeasurable losses. Cryptography is the guarantee and core technology of information security. [0003] Although public key algorithm encryption can solve many problems that cannot be solved by private key algorithm encryption, in the face of an increasingly large amount of data, from a practical point of view, the speed of private key encryption is often many times faster than that of public key. Cryptographic algorithms are still the mainst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 关红波陈立志胡晓波余秋芳陈学振田勇
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products