Hardware filling method for Hash algorithm SHA256 message preprocessing

A hash algorithm and filling method technology, applied in the direction of electrical digital data processing, electrical components, energy-saving calculations, etc., can solve the problems of inability to prevent malicious data damage, no resistance to data tampering, etc., and achieve low power consumption and reduced power consumption , to handle the effect of easy

Pending Publication Date: 2019-11-22
GUANGDONG UNIV OF TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The check algorithms we are more familiar with include parity check and CRC check. These two checks have no ability to resist data tampering. They can d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware filling method for Hash algorithm SHA256 message preprocessing
  • Hardware filling method for Hash algorithm SHA256 message preprocessing

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0034] Example 1

[0035] This embodiment provides a hardware filling method for preprocessing the SHA256 hash algorithm message, such as figure 1 , Including the following steps:

[0036] S1: In the message block input calculation state machine, the data length of each message block input calculation state machine is 32 bits, and the calculation state machine outputs the data length of the message block according to the number of data input and the effective bytes of the data;

[0037] S2: Input the output of the computing state machine together with the message block into the filling state machine, and the filling state machine adds the output of the computing state machine to the end of the message block to obtain the filled message block and output it;

[0038] S3: Pass the output of the filling state machine to the arithmetic module, and the arithmetic module outputs the 32-bit data of the filled message block as the input of the data path each time.

[0039] The output of the coun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware filling method for Hash algorithm SHA256 message preprocessing, which is characterized in that two state machines are used for respectively calculating message length and filling messages and can be divided into different states according to different outputs, at the moment, filled data can be transmitted by only one 32-bit register, and the area of a chip is reduced. Meanwhile, on a framework, the processing of the filling module becomes easy, and the period required for inputting one message block is equal to the period for processing one message block, sothat the processing speed of the chip is synchronous with that of an interface, a signal for handshaking with a filling part is reduced, and a gated clock unit is additionally arranged in front of thefilling part. According to the running state, an operation clock is turned off during data filling, and the filled clock is turned off during operation processing. Through the low-power-consumption design, power consumption of the algorithm can be greatly reduced during hardware operation.

Description

Technical field [0001] The present invention relates to the field of hardware filling, and more specifically, to a hardware filling method of hash algorithm SHA256 message preprocessing. Background technique [0002] In the era of big data, the development of social informatization and networking has led to an explosive growth of data. The amount of global data doubles approximately every two years. This means that the amount of data generated by humans in the last two years is equivalent to the entire amount of data generated before. Big data technology has quietly penetrated into various industries and has gradually become a production factor playing an important role. However, as big data technology has increased productivity and changed lifestyles, the ensuing security challenges cannot be ignored. At present, most of the solutions for information security are focused on the software level, and there are also information security solutions based on the hardware level, but th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F13/42H04L9/06
CPCG06F13/4221H04L9/0643Y02D10/00
Inventor 饶博刘元熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products