Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing reconfiguration of multiple hash algorithms

A hash algorithm and algorithm technology, applied in the field of realizing the reconfiguration of multiple hash algorithms, can solve problems such as poor configurability, insufficient reconfiguration level, and high-speed design of a single hash algorithm.

Active Publication Date: 2020-07-28
FENGHUO COMM SCI & TECH CO LTD +2
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the research on the implementation of the hash algorithm mainly focuses on two aspects: first, the high-speed design of a single hash algorithm, for each different algorithm, strategies such as multi-round expansion or critical path optimization to achieve high throughput of hash operations , but the designed hardware structure can only implement a single algorithm, and the configurability is poor
Second, two or more hash algorithms can be reconfigured and implemented. A single IP implements multiple hash algorithms. It is determined which algorithm is used to complete the calculation of the current input data through configuration registers or control signals, but the currently public ones can be reconfigured The configuration logic is reconfigurable for common modules such as control logic, buffer storage logic, and message filling grouping. For core operations such as message expansion and round functions, the reconfigurable level is not deep enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing reconfiguration of multiple hash algorithms
  • Method and system for realizing reconfiguration of multiple hash algorithms
  • Method and system for realizing reconfiguration of multiple hash algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0103] This embodiment provides a method for realizing the reconfigurability of multiple hash algorithms, including steps:

[0104] Receive the data to be authenticated and divide it into multiple 512bit (bit width) message blocks, store the initial values ​​of the four algorithms of SHA-1, SM3, SHA-224 and SHA-256, and store the constant data K required for iterative compression of the four alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing reconfigurable multiple hash algorithms, and relates to the field of network security, and the method comprises the steps: dividing to-be-authenticated data into a plurality of message blocks, and storing the initial values and constant data Kt of four algorithms: SHA-1, SM3, SHA-224 and SHA-256; expanding the SHA-1 algorithm into 80 piecesof expansion data, and expanding the SHA-224 or SHA-256 algorithm into 64 pieces of expansion data to obtain Wt; expanding the SM3 algorithm into 132 pieces of expanded data to obtain Wt and Wt '; starting from the initial value corresponding to the selected algorithm, performing 64 or 80 rounds of iterative compression operation on each message block in combination with Kt, Wt and Wt 'to obtainan intermediate hash value; and taking the intermediate hash value of the previous message block as an iterative initial value of the next message block, and calculating again until all the to-be-authenticated data is calculated. The invention can be applied to various scenes needing hash calculation, and the depth of a reconfigurable level is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for realizing the reconfigurability of multiple hash algorithms. Background technique [0002] With the rapid development of electronic information technology in today's world, the emergence of vicious attack methods such as viruses, hacker attacks, and electronic fraud has seriously threatened user data. If computers and communication equipment are attacked, it will cause information leakage and economic losses at the personal level, and at the serious level, it will cause the loss of important information at the national level, which will threaten national security and cause social unrest. In this environment, information security is particularly important. How to ensure data security in the process of information transmission has always been an issue of widespread concern in the society, and it is also a hot spot in current academic and industry research. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3239H04L2209/122
Inventor 张伟杨彦波黄元波刘政林杨东海
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products