SM3 acceleration method and device

A technology for accelerating instructions and computing devices, applied in the computer field, can solve problems such as long-term occupation, increased power consumption, and increased hardware costs, and achieve better configuration effects

Inactive Publication Date: 2019-07-16
OPEN SECURITY RES INC
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For some computing devices, such as general-purpose processors, when using pure software to perform SM3 hash operations, there are often disadvantages such as low efficiency and long-term occupation of the device, resulting in tight allocation of system resources and increased power consumption
And some hardware solutions, pure hardware realizes SM3 hash operation, which increases the hardware cost too much

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM3 acceleration method and device
  • SM3 acceleration method and device
  • SM3 acceleration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] The main process of the SM3 hash algorithm includes: message filling, message expansion and compression functions.

[0022] see figure 1 , the flowchart of the embodiment of the SM3 acceleration method provided by the present invention; the method of the present embodiment is applied to a computing device provided with internal regist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to an SM3 acceleration method and device. The method comprises the following steps: carrying out message filling and grouping on an input message to obtain a grouped message; performing message expansion on each grouped message to generate an expanded message word group; performing compression function calculation on each extended message word group to obtain a calculation result; wherein at least one of the message extension and the compression function calculation is realized through an extension instruction; and storing the calculation result in a preset register. According to the embodiment of the invention, a software and hardware combination mode is adopted, so that the efficiency of SM3 operation is effectively improved, the cost is considered, and better configuration of resources is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to an SM3 acceleration method and device. Background technique [0002] SM3 is a cryptographic hash algorithm (GM / T 0004-2012) released by the State Cryptography Administration, for the length less than 2 64 For bit information, the SM3 hash algorithm undergoes padding, iterative compression and output selection to generate a 256-bit hash value. For some computing devices, such as general-purpose processors, when using pure software to perform SM3 hash operations, there are often disadvantages of low efficiency and long-term occupation of the device, which leads to tight allocation of system resources and increased power consumption. For some hardware solutions, pure hardware realizes SM3 hash operation, which increases the hardware cost too much. How to improve the efficiency of SM3 computing while taking into account the cost to achieve a better a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L9/0643
Inventor 高夫
Owner OPEN SECURITY RES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products