Hardware optimization method based on SM3 password hash algorithm

A technology of hash algorithm and optimization method, applied in the field of information security, can solve problems such as user and enterprise losses, achieve the effect of saving implementation costs, solving optimization conflicts, and ensuring computing efficiency

Inactive Publication Date: 2018-01-12
广州星海集成电路基地有限公司
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the user information transmitted in the network is maliciously stolen or tampered with, it will cause immeasurable losses to both users and enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware optimization method based on SM3 password hash algorithm
  • Hardware optimization method based on SM3 password hash algorithm
  • Hardware optimization method based on SM3 password hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] like figure 1 Shown, a kind of hardware optimization method based on SM3 cryptographic hash algorithm is characterized in that, comprises the following steps:

[0027] Step 1, receiving a message m with a message length of 1 bit, filling m to obtain a message m';

[0028] Step 2, starting from the highest bit of m', grouping according to the length of 512 bits,

[0029] m'=B (0) , B (1) ,···,B (n-1) ;

[0030] Step 3. Put the grouped message B (i) Extend according to the extension method to generate 16 32-bit extension words W 0 , W 1 ,···,W 15 , 1 dynamic message extension word W′ j and 1 intermediate variable word WW j ;

[0031] Step 4. Calculate the initial value X of the intermediate variables X, Y, and Z 0 , Y 0 ,Z 0 , put the grouped message into the compression function to get the variable A j -H j i iteration value V with V i ;

[0032] Step 5: Get the variable A by operation j -H j i iteration value V with V i Perform XOR operation to get ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware optimization method based on an SM3 password hash algorithm. The method includes receiving a message m with the length of l bits , and filling m to obtain a messagem'; starting from the highest bit of m', and grouping according to the length of 512 bits, m'= B (0), B (1),..., B (n-1); expanding the grouped message B (i) according to an extension method, and generating 16 32-bit extension words W0, W1, ..., W15, one dynamic message extension word Wj' and one intermediate variable word WWj; and placing the grouped message into a compression function for operation to obtain variables Aj-Hj and the i-time iteration value Vi of V; subjecting the variables Aj-Hj and the i-time iteration value Vi of V obtained by operation to the exclusion operation to obtain V(i+1); and outputting a hash value V(N). According to the method, the operation efficiency of the SM3 password hash algorithm is effectively improved, and the software and hardware implementation costof the SM3 password algorithm is greatly saved, the calculation amount of the algorithm is not increased, and the calculation efficiency of the algorithm is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hardware optimization method based on the SM3 cryptographic hash algorithm. Background technique [0002] With the increasing wave of global informatization represented by the Internet, the application of the Internet of Things is becoming more and more popular and in-depth in daily life. The application field is gradually expanding from traditional business and small business systems to large business and key business systems. Typical business systems are as follows: Enterprise business system, government department business system, financial business system, etc. With the gradual popularization and deepening of Internet of Things applications, information security has become an important issue affecting network performance, and due to the openness and freedom of the network itself, higher requirements are put forward for information security. Once the user infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 徐明熊晓明
Owner 广州星海集成电路基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products