Modified SHA-1 hash algorithm
A hash algorithm and addition technology, applied in the field of SHA-1 hash algorithm, can solve the problem of lack of calculation amount, and achieve the effect of improving efficiency and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] A kind of improved SHA-1 hash algorithm, comprises the following steps:
[0066] Step (1) adds a 1 and several 0s (at least 1, up to 512) behind the message to be processed, so that the length of the message becomes 448 as a result of the remainder of 512;
[0067] Step (2) add a 64-bit binary string behind the newly obtained message, the value of the binary string is the original length of the message, and the length of the message is now a multiple of 512, and then the message is expanded and grouped so that the original 512-bit The packet becomes a 1024bit packet, that is, adjacent 512bit packets form a new 1024bit packet.
[0068] In the SHA-1 algorithm, the length is less than 2 64 The message is divided into multiple 512bit packets after being assembled, and one packet is processed each time. The algorithm first expands the original 512-bit words, that is, 16 32-bit words, to 80 32-bit words according to certain rules, to meet the needs of four loop modules in t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com