Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Accelerator for accelerating security hash algorithm

A secure hash algorithm and accelerator technology, applied in the field of computer architecture, can solve the problems of serious dependence on instruction data, large number of instructions, high power consumption, etc., achieve good scalability and compatibility, reduce power consumption overhead, The effect of reducing time overhead

Active Publication Date: 2020-10-02
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The first type of solution is to use multiple processors to calculate multiple hash values ​​​​in parallel. The problem with this type of method is not only that it will bring large power consumption, but also for each processor, the speedup ratio does not change. ;
[0005] The second type of solution is to use the compiler to optimize the instructions of the original secure hash algorithm at the software level, but the secure hash function is optimized by the compiler due to the complex operation, large number of instructions, and serious data dependence between instructions. The effect is not obvious;
[0006] The third type of solution is to customize dedicated acceleration circuits for secure hash functions, but secure hash function clusters include many functions and develop rapidly, and dedicated circuits have disadvantages such as poor scalability and poor compatibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accelerator for accelerating security hash algorithm
  • Accelerator for accelerating security hash algorithm
  • Accelerator for accelerating security hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific implementation manners of the present invention will be described below in conjunction with the drawings and specific embodiments.

[0038] In view of the problems existing in the prior art, the inventor intends to make improvements in the following aspects.

[0039] First, due to the complex operation of the secure hash algorithm itself, the large number of instructions, and the serious data dependence, the effect of optimization is not obvious only through software technologies such as compilation optimization; Although the acceleration of the column algorithm can bring obvious acceleration effects, the special circuit structure is difficult to apply to other secure hash algorithms, and the scalability and compatibility are poor. The inventor believes that only through a complete set of software and hardware cooperating system can the secure hash function be accelerated efficiently.

[0040] Second, the existing method for accelerating the secure hash al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an accelerator for accelerating a security hash algorithm. The accelerator comprises a storage module, a PE operation module, a task division module and an algorithm mapping module. Compared with the prior art, the method has the advantages that the calculation time overhead can be reduced, and the calculation performance is improved; secondly, the power consumption caused by calculation can be reduced; and, besides, high-throughput calculation of the safety hash function can be achieved, the hash rate is remarkably increased, and a computer system designed through the method has good expandability and compatibility.

Description

technical field [0001] The invention belongs to the field of computer architecture, and in particular relates to an accelerator for accelerating a safe hash algorithm. Background technique [0002] With the rise of digital currency, secure hash functions have entered the field of vision of researchers. A secure hash function is a function that implements a secure hash algorithm. Secure Hash Algorithm (SHA for short) is a commonly used data encryption algorithm, which can realize functions such as data confidentiality, data modification prevention and identity verification, and is widely used in the fields of cryptography, e-commerce and information security. The secure hash algorithm can calculate a fixed-length string corresponding to a digital message, and if the input messages are different, they have a high probability of corresponding to different strings. The SHA series algorithms can be divided into two categories: SHA-1 and SHA-2. Among them, SHA-1 is designed by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/06G06Q20/38
CPCG06Q20/065G06Q20/3827G06Q20/3829Y02D10/00
Inventor 范志华吴欣欣李文明安学军叶笑春范东睿
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products