Implementation method and system of secure hash algorithm, medium and equipment

A technology of secure hash algorithm and implementation method, which is applied in the field of systems, media and equipment, and the implementation method of secure hash algorithm, which can solve the problems of excessive resource consumption, time-consuming hardware implementation of secure hash algorithm, etc., and achieve optimal calculation Time, the effect of optimizing the critical path

Active Publication Date: 2021-08-24
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to propose a method, system, medium and equipment for implementing a secure hash algorithm, s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and system of secure hash algorithm, medium and equipment
  • Implementation method and system of secure hash algorithm, medium and equipment
  • Implementation method and system of secure hash algorithm, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0043] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used to distinguish two entities with the same name or different parameters. It can be seen that "first" and "second" " is only for the convenience of expression, and should not be understood as limiting the embodiment of the present invention. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, of a process, method, system, product or other steps or elements inherent in a process, method, system, product, or device comprising a series of steps or elements.

[0044] Based on the above purpo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an implementation method and system of a secure hash algorithm, a medium and equipment, and the method comprises the steps: dividing input data into a plurality of data blocks, sequentially dividing the data blocks into m message words, and executing the following steps for each data block: responding to the condition that the number n of iterations is less than or equal to m, inputting the n-th message word as a message word of the nth round of iteration into an entry of the iterative algorithm hardware structure, and obtaining a first permutation function and a second permutation function of the n-th round of iteration; in response to the fact that n is greater than m, obtaining a first permutation function and a second permutation function of the nth iteration based on a plurality of message words in the first m message words, obtaining message words of the nth iteration, and inputting the message words into an entry of an iterative algorithm hardware structure; and obtaining output data of the n-th round of iteration based on the message word of the n-th round of iteration, the first permutation function, the second permutation function and output data of the (n-1)-th round of iteration. According to the method, the algorithm calculation time is optimized, and the performance of a hardware algorithm structure is improved.

Description

technical field [0001] The present invention relates to the field of algorithm technology, in particular to a method, system, medium and equipment for realizing a secure hash algorithm. Background technique [0002] The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions. It is a secure hash algorithm certified by FIPS. It can calculate a fixed-length string (also known as a message digest) corresponding to a digital message. The five algorithms of the SHA family are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, and the latter four are sometimes referred to as SHA-2. Among them, the length of the message digest value of the SHA-256 algorithm is 256 bits. With the anti-attack cracking of SHA-1, the SHA-256 algorithm is currently the most widely used in major security fields. The SHA-256 algorithm supports plaintext input whose length is limited to 264 bits, the message packet length is 512 bits, and the message word length in the iterative compression p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0643H04L2209/122
Inventor 孙旭周玉龙杨琳琳
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products