Secure implementation method and device for Hash grouping calculation
An implementation method and hash technology, applied in the field of information security, can solve problems such as the threat of hash algorithm
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0126] Embodiment 1 of the present invention provides a secure implementation method for hash group calculation, such as figure 1 shown, including:
[0127] Step S1: The CPU calculates the initial vector in the first buffer area and the data on the upper 8 words in the second buffer area and stores the calculation results in the third buffer area, and calculates the original data in the fourth buffer area and The data on the lower 16 words in the second buffer area is calculated and the calculation result is stored in the fifth buffer area; the data on the lower 16 words in the second buffer area is stored in the sixth buffer area;
[0128] Specifically, step S1 includes: the CPU performs an XOR operation on the initial vector in the first buffer area and the data on the upper 8 words in the second buffer area and stores the calculation result in the third buffer area, The original data in the area and the data on the lower 16 words in the second buffer area are subjected to ...
Embodiment 2
[0172] Embodiment 2 of the present invention provides a secure implementation method for hash group calculation, such as figure 2 and image 3 shown, including:
[0173] Step 101: The CPU obtains the initial vector and saves it in the first buffer area, obtains the original data and saves it in the fourth buffer area; generates a first random number with a preset length and saves it in the second buffer area;
[0174] Specifically, in this embodiment, the length of the initial vector is 8 words, the length of the original data is 16 words, and the length of the first random number is 24 words; each word is 32bit;
[0175] 例如,本实施例中的初始向量为0x6a09e667 0xbb67ae85 0x3c6ef3720xa54ff53a 0x510e527f 0x9b05688c 0x1f83d9ab 0x5be0cd19,原始数据为0XB505CD880X6E54FD04 0X4F7119A8 0X541922FB 0X665B3EDE 0XE7839780 0XE93C869A 0X44BE23060XD98E8B58 0XAFCD7BC8 0XFF9D83DE 0X165CB5A6 0XEC410A1B 0XD33C4EC2 0XBFADD5B30XF6CD5447,生成的第一随机数为0x09b7cbdd 0x5f253cc0 0xdbdae401 0xb8d57bbe0x14e6a026 0x64607bfd 0x6326...
Embodiment 3
[0253] Embodiment 3 of the present invention provides a security implementation device for hash group calculation, such as Figure 4 As shown, the device includes a CPU and a memory, and the memory includes a first buffer area, a second buffer area, a third buffer area, a fourth buffer area, a fifth buffer area, a sixth buffer area, a seventh buffer area, and an eighth buffer area area, the ninth buffer area, the seventeenth buffer area, the eighteenth buffer area, the nineteenth buffer area, and the twenty-seventh buffer area, the CPU includes a first computing module, a second computing module, a third computing module, a Four calculation modules, the first judgment module and the fifth calculation module;
[0254] The first calculation module is used to calculate the initial vector in the first buffer area and the data on the high 8 words in the second buffer area and store the calculation result in the third buffer area, and calculate the data in the fourth buffer area Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


