A method to implement SHA-1 algorithm using GPU
An algorithm and function technology, applied in the field of using GPU to realize SHA-1 algorithm, can solve the problems of poor processing performance of information security equipment, poor security of operation process, and high CPU load, so as to improve processing performance, high security, and reduce CPU load. load effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0014] The present invention is further described below, but the protection scope of the present invention is not limited to the following description.
[0015] A method for implementing the SHA-1 algorithm using a GPU, comprising the following steps:
[0016] (1) Implement the SHA-1 algorithm on a general-purpose CPU: The implementation of the SHA-1 algorithm on a general-purpose CPU includes at least the initialization function SHA1Init, the update function SHA1Update, and the termination function SHA1Final that repeatedly perform shift, AND, OR, and XOR operations, as follows Shown:
[0017] void SHA1Init (SHA1Context *sc)
[0018] {
[0019] ...
[0020]}
[0021] void SHA1Update (SHA1Context *sc, const void *vdata, uint32_t len)
[0022] {
[0023] ...
[0024]}
[0025] void SHA1Final (SHA1Context *sc, uint8_t hash[SHA1_HASH_SIZE])
[0026] {
[0027] ...
[0028]}
[0029] int main (int argc, char *argv[])
[0030] {
[0031] SHA1Context foo;
[00...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com