Device compatible with three SHA standards and realization method thereof

An implementation method and technology of SHA-512, applied in the field of comprehensive design, can solve the problems of increasing the cost of replacing equipment, hidden dangers of TPM chip security, etc.

Inactive Publication Date: 2010-11-24
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the TPM chip is not upwardly compatible with SHA-1 and downwardly compatible with SHA-256 or SHA-512, it will not only increase the cost of replacing equi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device compatible with three SHA standards and realization method thereof
  • Device compatible with three SHA standards and realization method thereof
  • Device compatible with three SHA standards and realization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0095] like figure 1 As shown, a device compatible with three SHA standards mainly includes a sequentially connected data filling module, Wt generation module and hash operation module.

[0096] The data filling module is used to receive plaintext data and generate filling data, and write the filling data of plaintext data to the Wt generation module;

[0097] The Wt generation module is used to receive the data output by the data filling module, connect each operand through exclusive OR operation in SHA-1 mode, and perform arithmetic addition operation on each operand in SHA-256 and SHA-512 mode Connect, generate a new Wt operator and input it to the hash operation module;

[0098] The hash operation module is used to receive the Wt operator of the Wt generation module, perform hash operation, and generate a 160-bit, 256-bit or 512-bit data summary.

[0099] like figure 2 As shown, the data filling module mainly includes a register, a subtractor and a multiplexer;

[010...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device compatible with three SHA standards, which comprises a data filling module, a Wt generation module and an Hash operation module, which are connected in order. The invention also discloses a realization method of the device compatible with three SHA standards, which comprises the following steps: (I) receiving cleartext data by the data filling module to generate filling data and outputting the data to the Wt generation module; (II) generating new Wt operators by the Wt generation module and inputting the new Wt operators into the Hash operation module; and (III) generating a data abstract with 160 bits under an SHA-a mode, generating a data abstract with 256 bits under SHA-256 mode or generating a data abstract with 512 bits under an SHA-512 mode by the Hash operation module. The invention has the advantages of common practicality, good compatibility, low power consumption, less occupation of extra resources and the like.

Description

technical field [0001] The invention relates to the field of comprehensive design of SHA series algorithms (SHA-1, SHA-256 and SHA-512) based on FPGA (Field-Programmable Gate Array), in particular to a device compatible with three SHA standards and an implementation method thereof. Background technique [0002] The SHA-1 algorithm is currently a popular hash hash encryption algorithm, and it is also an encryption algorithm specified in the Trusted Computing Specification. However, in recent years, the defects of the SHA-1 algorithm have been exposed, and the SHA-256 and SHA-512 algorithms with higher security are the best alternatives to SHA-1. In order for the Trusted Computing Module (Trusted Platform Module, TPM) to provide services compatible with the previous-generation specification when the next-generation trusted computing specification is released, a practical comprehensive implementation of the SHA algorithm is particularly necessary. [0003] In the prior art, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/71
Inventor 陈虎何建华黄华强奚建清
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products