Unlock instant, AI-driven research and patent intelligence for your innovation.

SM3 data encryption method and related device

A data encryption and adder technology, applied in the computer field, can solve the problems of not being able to apply small-area chips well, consume large circuit resources, and reduce applicability, so as to improve applicability, reduce delay, and avoid carry delay. when the effect

Pending Publication Date: 2021-11-09
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it will consume a large amount of circuit resources during hardware implem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM3 data encryption method and related device
  • SM3 data encryption method and related device
  • SM3 data encryption method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The core of the application is to provide an SM3 data encryption method, an encryption data device, a computing device and a computer-readable storage medium, so as to improve the utilization rate of circuit resources and the efficiency of calculation.

[0040] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] In related technologies, the pipeline-based SM3 algorithm uses a pipeline method whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM3 data encryption method, and the method comprises the following steps: performing filling grouping processing on received plaintext data to obtain multiple groups of data; performing grouping expansion processing according to the multiple groups of data to obtain message words; and carrying out iterative compression calculation on the multiple groups of data and the message word by adopting a carry lookahead adder to obtain encrypted data. The carry lookahead adder is adopted to carry out iterative compression calculation on the multiple groups of data and the message words, that is, the carry lookahead adder is adopted to carry out calculation in the iterative compression calculation process, so carry delay existing in the adder in XOR shift operation is avoided, the operation efficiency of the adder is improved, delay is reduced, and the encryption applicability of the SM3 algorithm is improved. The invention further discloses an SM3 encryption data device, computing equipment and a computer readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an SM3 data encryption method, a data encryption device, computing equipment, and a computer-readable storage medium. Background technique [0002] The SM3 algorithm is used as a cryptographic hash algorithm, the length of the output message digest value is 256bit, the length of the message group is 512bit, and the number of iterative compression is 64 times. In the hardware implementation of the algorithm, the data generally needs to go through processes such as message grouping and filling, expansion to generate message words, and 64 rounds of function iterative compression. The function iterative compression process is complex to calculate, consumes the most resources, and consumes the most time. Corresponding optimization. [0003] In related technologies, the pipeline-based SM3 algorithm uses a pipeline method when performing 64 rounds of function iterative ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
CPCH04L9/0643
Inventor 孙旭周玉龙宋琪
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD